Roman Wirtz

Roman Wirtz, M. Sc.
Anschrift Oststr. 99
Raum BB 917b
Telefon +49 203 379 3212
Fax +49 203 379 4490
Email roman.wirtz[at]uni-duisburg-essen.de
Forschungsschwerpunkte
- Security
- Risikomanagement
- Anforderungsanalyse
- Model-basiertes Software Engineering
- Webentwicklung
Vita
seit 10/16 |
Wissenschaftlicher Mitarbeiter am Lehrstuhl Software Engineering |
04/14 - 09/16 |
M. Sc. Angewandte Informatik, Universität Duisburg-Essen |
10/11 - 03/14 |
B. Sc. Angewandte Informatik, Universität Duisburg-Essen |
Projekte
- Werkzeuggestütze Bedrohungsanalyse von Software: Forschungskooperation mit Siemens
Abschlussarbeiten
Bis Juli 2021 habe ich leider keine Kapazitäten für die Betreuung von Abschlussarbeiten frei. Sie können sich allerdings gerne schon vorab auf eines der folgenden Themen bewerben bzw. ein eigenes aus einem meiner Forschungsgebiete vorschlagen.
Thema | Voraussetzungen | Bachelor / Master |
---|---|---|
Werkzeuggestützte Mustererkennung & -instanziierung in der Anforderungsanalyse
|
|
Je nach Umfang |
-
Risk Treatment : An Iterative Method for Identifying ControlsIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020 / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Hrsg.) 2021, S. 283 - 310
ISBN: 978-3-030-70005-8; 978-3-030-70006-5Online Volltext: dx.doi.org/ -
Threat modeling for cyber-Physical systems : A two-dimensional taxonomy approach for structuring attack actionsIn: Proceedings of the 15th International Conference on Software Technologies / ICSOFT 2020; Virtual, Online; France; 7 - 9 July 2020 2020, S. 160 - 171
ISBN: 9789897584435 -
Systematic treatment of security risks during requirements engineeringIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, S. 132 - 143
ISBN: 9789897584213 -
Distributed frames : Pattern-based characterization of functional requirements for distributed systemsIn: Software Technologies / 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.) 2020, S. 81 - 107
ISBN: 978-3-030-52990-1; 978-3-030-52991-8Online Volltext: dx.doi.org/ -
Model-Based Risk Analysis and Evaluation Using CORAS and CVSSIn: Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019 ; Revised Selected Papers / International Conference on Evaluation of Novel Approaches to Software Engineering ; ENASE 2019 ; Heraklion, May 4–5, 2019 / Damiani, Ernesto; Spanoudakis, George (Hrsg.) 2020, S. 108 - 134
ISBN: 978-3-030-40222-8; 978-3-030-40223-5Online Volltext: dx.doi.org/ -
Systematic Asset Identification and Modeling During Requirements EngineeringIn: Risks and Security of Internet and Systems: Proceedings / 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019 / Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Kacem, Ahmed Hadj (Hrsg.) 2020, S. 50 - 66
ISBN: 978-3-030-41567-9; 978-3-030-41568-6Online Volltext: dx.doi.org/ -
Risk identification : From requirements to threat modelsIn: Proceedings of the 6th International Conference on Information Systems Security and Privacy: February 25-27, 2020, in Valletta, Malta, Volume 1 / 6th International Conference on Information Systems Security and Privacy, 25.-27.02.2020, Valletta, Malta / Furnell, Steven; Mori, Paolo; Weippl, Edgar; Camp, Olivier (Hrsg.) 2020, S. 385 - 396
ISBN: 978-989-758-399-5Online Volltext: dx.doi.org/ -
A Systematic Method to Describe and Identify Security Threats Based on Functional RequirementsIn: Risks and Security of Internet and Systems: Revised Selected Papers / 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018 / Zemmari, Akka; Mosbah, Mohamed; Cuppens-Boulahia, Nora; Cuppens, Frédéric (Hrsg.) 2019, S. 205 - 221
ISBN: 978-3-030-12142-6; 978-3-030-12143-3Online Volltext: dx.doi.org/ -
Risk-Based Elicitation of Security Requirements According to the ISO 27005 StandardIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23–24, 2018 / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek A. (Hrsg.) 2019, S. 71 - 97
ISBN: 978-3-030-22558-2; 978-3-030-22559-9Online Volltext: dx.doi.org/ -
CVSS-based Estimation and Prioritization for Security RisksIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, S. 297 - 306
ISBN: 978-989-758-375-9Online Volltext: dx.doi.org/ (Open Access) -
RE4DIST: Model-based elicitation of functional requirements for distributed systemsIn: Proceedings of the 14th International Conference on Software Technologies / ICSOFT 2019, Prague, Czech Republic, 26 - 28 July 2019 / van Sinderen, Marten; Maciaszek, Leszek (Hrsg.) 2019, S. 71 - 81
ISBN: 978-989-758-379-7Online Volltext: dx.doi.org/ -
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem DiagramsIn: Software Technologies: Revised Selected Papers / 13th International Conference, ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.) 2019, S. 150 - 172
ISBN: 978-3-030-29156-3; 978-3-030-29157-0 ISSN: 1865-0929; 1865-0937Online Volltext: dx.doi.org/ -
Pattern-based modeling of cyber-physical systems for analyzing securityIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a23
ISBN: 978-1-4503-6206-1Online Volltext: dx.doi.org/ -
Managing security risks : Template-based specification of controlsIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a10
ISBN: 978-1-4503-6206-1Online Volltext: dx.doi.org/ -
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Hrsg.) 2019, S. 223 - 234
ISBN: 978-3-030-26250-1; 978-3-030-26249-5Online Volltext: dx.doi.org/ -
Problem-based elicitation of security requirements the ProCOR methodIn: ENASE 2018: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering / International Conference on Evaluation of Novel Approaches to Software Engineering ; 23 - 24 March 2018, Funchal, Madeira, Portugal / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek (Hrsg.) 2018, S. 26 - 38
ISBN: 978-989-758-300-1Online Volltext: dx.doi.org/ -
A taxonomy of requirements for the privacy goal transparencyIn: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 / Fischer-Hübner, Simone (Hrsg.) Jg. 9264 2015, S. 195 - 209
ISBN: 978-3-319-22906-5 ISSN: 1611-3349; 0302-9743Online Volltext: dx.doi.org/
2021
2020
2019
2018
2015
Aktuelle Veranstaltungen
- 2021 SS
Vergangene Veranstaltungen (max. 10)
- 2020 WS
- 2020 SS
- 2019 WS
- 2019 SS