Guttorm Sindre
Guttorm Sindre
Verifisert e-postadresse på idi.ntnu.no
Sitert av
Sitert av
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10, 34-44, 2005
Understanding quality in conceptual modeling
OI Lindland, G Sindre, A Solvberg
IEEE software 11 (2), 42-49, 1994
Process models representing knowledge for action: a revised quality framework
J Krogstie, G Sindre, H Jørgensen
European Journal of Information Systems 15, 91-102, 2006
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
Defining quality aspects for conceptual models
J Krogstie, OI Lindland, G Sindre
Information System Concepts: Towards a consolidation of views, 216-231, 1995
Towards a deeper understanding of quality in requirements engineering
J Krogstie, OI Lindland, G Sindre
Seminal Contributions to Information Systems Engineering: 25 Years of CAiSE …, 2013
Evaluating the quality of information models: empirical testing of a conceptual model quality framework
DL Moody, G Sindre, T Brasethvik, A Solvberg
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
The REBOOT approach to software reuse
G Sindre, R Conradi, EA Karlsson
Journal of Systems and Software 30 (3), 201-212, 1995
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001 74, 2001
Evaluating the quality of process models: Empirical testing of a quality framework
DL Moody, G Sindre, T Brasethvik, A Sølvberg
ER, 380-396, 2002
On the purpose of object-oriented analysis
GM Høydalsvik, G Sindre
ACM Sigplan Notices 28 (10), 240-255, 1993
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
Proc. 9th International Workshop on Requirements Engineering: Foundation for …, 2003
Cheating in e-exams and paper exams: the perceptions of engineering students and teachers in Norway
A Chirumamilla, G Sindre, A Nguyen-Duc
Assessment & Evaluation in Higher Education 45 (7), 940-957, 2020
Mal-activity diagrams for capturing attacks on business processes
G Sindre
Requirements Engineering: Foundation for Software Quality: 13th …, 2007
An analytical evaluation of BPMN using a semiotic quality framework
T Wahl, G Sindre
Advanced Topics in Database Research, Volume 5, 94-105, 2006
Experimental validation of the learning effect for a pedagogical game on computer fundamentals
G Sindre, L Natvig, M Jahre
IEEE Transactions on Education 52 (1), 10-18, 2008
Evaluating the effectiveness of learning interventions: an information systems case study
DL Moody, G Sindre
The Ransomware-as-a-Service economy within the darknet
PH Meland, YFF Bayoumy, G Sindre
Computers & Security 92, 101762, 2020
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
Requirements Engineering: Foundation for Software Quality: 16th …, 2010
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20