Follow
Nicolas Mayer
Nicolas Mayer
Verified email at list.lu - Homepage
Title
Cited by
Cited by
Year
A systematic approach to define the domain of information system security risk management
É Dubois, P Heymans, N Mayer, R Matulevičius
Intentional perspectives on information systems engineering, 289-306, 2010
2142010
Model-based management of information system security risk
N Mayer
University of Namur, 2009
1632009
Alignment of misuse cases with security risk management
R Matulevicius, N Mayer, P Heymans
2008 Third International Conference on Availability, Reliability and …, 2008
1112008
Adapting secure tropos for security risk management in the early phases of information systems development
R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon
Advanced Information Systems Engineering: 20th International Conference …, 2008
1042008
An integrated conceptual model for information system security risk management supported by enterprise architecture management
N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa
Software & Systems Modeling 18, 2285-2312, 2019
1022019
Towards a risk-based security requirements engineering framework
N Mayer, A Rifaut, E Dubois
Proc. of REFSQ 5, 2005
872005
Design of a Modelling Language for Information System Security Risk Management.
N Mayer, P Heymans, R Matulevicius
RCIS, 121-132, 2007
722007
A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology.
A Ellervee, R Matulevicius, N Mayer
ER Forum/Demos 1979, 320-333, 2017
612017
Syntactic and semantic extensions to secure tropos to support security risk management
R Matulevicius, H Mouratidis, M Nicolas, D Eric, P Heymans
Journal of Universal Computer Science 18 (6), 816-844, 2012
372012
Tailoring ISO/IEC 27001 for SMEs: a guide to implement an information security management system in small settings
T Valdevit, N Mayer, B Barafort
Software Process Improvement: 16th European Conference, EuroSPI 2009, Alcala …, 2009
322009
Towards a Measurement Framework for Security Risk Management.
N Mayer, E Dubois, R Matulevicius, P Heymans
MODSEC@ MoDELS, 2008
302008
Evaluation of the risk and security overlay of archimate to model information system security risks
N Mayer, C Feltus
2017 IEEE 21st International Enterprise Distributed Object Computing …, 2017
282017
Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo
B Alcalde, E Dubois, S Mauw, N Mayer, S Radomirovic
Seventh Australasian Information Security Conference (AISC 2009), 61-69, 2009
272009
Towards the ENTRI framework: security risk management enhanced by the use of enterprise architectures
N Mayer, E Grandry, C Feltus, E Goettelmann
Advanced Information Systems Engineering Workshops: CAiSE 2015 International …, 2015
242015
Requirements engineering for improving business/IT alignment in security risk management methods
N Mayer, E Dubois, A Rifaut
Enterprise Interoperability II: New Challenges and Approaches, 15-26, 2007
242007
Assessing risks and opportunities in enterprise architecture using an extended ADT approach
S Sousa, D Marosin, K Gaaloul, N Mayer
2013 17th IEEE International Enterprise Distributed Object Computing …, 2013
232013
A general approach for a trusted deployment of a business process in clouds
E Goettelmann, N Mayer, C Godart
Proceedings of the Fifth International Conference on Management of Emergent …, 2013
192013
Sector-based improvement of the information security risk management process in the context of telecommunications regulation
N Mayer, J Aubert, H Cholez, E Grandry
European Conference on Software Process Improvement, 13-24, 2013
182013
An ISO compliant and integrated model for IT GRC (governance, risk management and compliance)
N Mayer, B Barafort, M Picard, S Cortina
Systems, Software and Services Process Improvement: 22nd European Conference …, 2015
172015
Integration of IT governance and security risk management: A systematic literature review
D De Smet, N Mayer
2016 International Conference on Information Society (i-Society), 143-148, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20