20132019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

A Business Ecosystem Architecture Modeling Framework

Wieringa, R. J., Engelsman, W., Gordijn, J. & Ionita, D., 22 Aug 2019, 2019 IEEE 21st Conference on Business Informatics (CBI). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Towards risk-driven security requirements management in agile software development

Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E., Daneva, M. & Kuipers, M., 1 Jan 2019, Information Systems Engineering in Responsible Information Systems: CAiSE Forum 2019, Rome, Italy, June 3–7, 2019, Proceedings. Cappiello, C. & Ruiz, M. (eds.). Cham: Springer, p. 133-144 12 p. (Lecture Notes in Business Information Processing; vol. 350).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

Graphical Modeling of Security Arguments: Current State and Future Directions

Ionita, D., Ford, M., Vasenev, A. & Wieringa, R. J., 2018, Graphical Models for Security: 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Liu, P., Mauw, S. & Stolen, K. (eds.). Springer, p. 1 - 16 16 p. (Lecture Notes in Computer Science; vol. 10744).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Tool Support for Value Modeling and Risk Analysis of e-Services

Wieringa, R. J., Gordijn, J. & Ionita, D., 2018, 24th Joint International Conference on Requirements Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
37 Downloads (Pure)
2017

Outlining an ‘Evaluation continuum’: Structuring evaluation methodologies for infrastructure-related decision making tools

Vasenev, A., Montoya, L. & Ionita, D., 2017, Smart Grid Inspired Future Technologies: Second EAI International Conference, SmartGIFT 2017, London, UK, March 27–28, 2017, Proceedings. Lau, E. T., chai, M. K. K., Chen, Y., Jung, O., Leung, V. C. M., Yang, K., Bessler, S., Loo, J. & Nakayama, T. (eds.). Springer, p. 243-249 6 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 203).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
126 Downloads (Pure)

Towards security requirements: Iconicity as a feature of an informal modeling language

Vasenev, A., Ionita, D., Zoppi, T., Ceccarelli, A. & Wieringa, R. J., 2017, CEUR Workshop Proceedings. RWTH Aachen: CEUR, Vol. 1796. p. 1-15 15 p. (CEUR Workshop Proceedings; vol. 1796).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
14 Downloads (Pure)
2016

ArgueSecure: Out-of-the-box Risk Assessment

Ionita, D., Kegel, R., Baltuta, A. & Wieringa, R., Sep 2016, Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, NJ: IEEE Computer Society, p. 74-79 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A study on tangible participative enterprise modelling

Ionita, D., Kaidalova, J., Vasenev, A. & Wieringa, R., 17 Nov 2016, Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings. Link, S. & Trujillo, J. C. (eds.). Cham: Springer, p. 139-148 10 p. (Lecture Notes in Computer Science; vol. 9975).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
50 Downloads (Pure)

Automated Identification and Prioritization of Business Risks in e-service Networks

Ionita, D., Wieringa, R. J. & Gordijn, J., 19 May 2016, Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016. Borangiu, T., Dragoicea, M. & Novoa, H. (eds.). London: Springer, p. 547-560 14 p. (Lecture Notes in Business Information Processing; vol. 247).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
83 Downloads (Pure)

Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

Vasenev, A., Montoya, L., Ceccarelli, A., Le, A. & Ionita, D., May 2016, 1st EAI International Conference on Smart Grid Inspired Future. London: Springer, p. 184-192 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
6 Citations (Scopus)
63 Downloads (Pure)

Value-Driven Risk Analysis of Coordination Models

Ionita, D., Gordijn, J., Yesuf, A. S. & Wieringa, R. J., 10 Nov 2016, The Practice of Enterprise Modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Proceedings. London: Springer, p. 102-116 15 p. (Lecture Notes in Business Information Processing; vol. 267).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2015

Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group

Ionita, D., Wieringa, R. J., Bullee, J-W. & Vasenev, A., 22 Oct 2015, 34th International Conference on Conceptual Modeling, ER 2015. Johannesson, P., Li Lee, M., Liddle, S. W., Opdahl, A. L. & López, Ó. P. (eds.). Berlin: Springer, p. 558-565 8 p. (Lecture Notes in Computer Science; vol. 9381).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Using Value Models for Business Risk Analysis in e-Service Networks

Ionita, D., Wieringa, R. J., Wolos, L., Gordijn, J. & Pieters, W., 12 Nov 2015, 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015. Ralyté, J., España, S. & Pastor, O. (eds.). Berlin: Springer, p. 239-253 15 p. (Lecture Notes in Business Information Processing; vol. 235).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2014

Argumentation-Based Security Requirements Elicitation: The Next Round

Ionita, D., Bullee, J-W. & Wieringa, R. J., 25 Aug 2014, Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). Piscataway, New Jersey: IEEE Computer Society, p. 7-12 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Context-sensitive Information security Risk identification and evaluation techniques

Ionita, D., 25 Aug 2014, 22nd IEEE International Requirements Engineering Conference (RE14). Piscataway, New Jersey: IEEE, p. 485-488 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2013

An API-based search system for one click access to information

Ionita, D., Tax, N. & Hiemstra, D., Jun 2013, Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies. Tokyo, Japan: National Institute of Informatics, p. - 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
19 Downloads (Pure)

Information fusion of GNSS sensor readings, field notes, and expert's a priori knowledge

Vasenev, A., Ionita, D., Bijleveld, F., Hartmann, T. & Doree, A. G., 1 Jul 2013, eg-ice 2013 20th international workshop: intelligent computing in engineering, July 1 - 3, 2013, Vienna, Austria. Suter, G., de Wilde, P. & Rafiq, Y. (eds.). Vienna, Austria: TU Wien, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
17 Downloads (Pure)

Risk assessment as an argumentation game

Prakken, H., Ionita, D. & Wieringa, R. J., Sep 2013, 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV. Leite, J., Son, T. C., Torrini, P., Van Der Torre, L. & Woltran, S. (eds.). London: Springer, p. 357-373 17 p. (Lecture Notes in Computer Science; vol. 8143).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)