Search

Your search keyword '"Koen Yskout"' showing total 72 results

Search Constraints

Start Over You searched for: Author "Koen Yskout" Remove constraint Author: "Koen Yskout"
72 results on '"Koen Yskout"'

Search Results

1. Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study

2. Using provocative design to foster electronic informed consent innovation

35. Security and Privacy Requirements for Electronic Consent

38. Threat modeling

40. Security Threat Modeling: Are Data Flow Diagrams Enough?

41. Security patterns 2.0

42. SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment

43. Design notations for secure software: a systematic literature review

44. Knowledge-enriched security and privacy threat modeling

45. Solution-aware data flow diagrams for security threat modeling

46. Interaction-based privacy threat elicitation

47. Risk-based design security analysis

49. A Modular Meta-model for Security Solutions

50. Towards systematically addressing security variability in software product lines

Catalog

Books, media, physical & digital resources