Guttorm Sindre

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
1993
Publication period end
2010
Number of co-authors
14

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Omoronyia, Inah, Sindre, Guttorm, Stålhane, Tor, Biffl, Stefan, Moser, Thomas, Sunindyo, Wikan Danar (2010): A Domain Ontology Building Process for Guiding Requirements Elicitation. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 188-202. http://dx.doi.org/10.1007/978-3-642-14192-8_18

Kárpáti, Péter, Sindre, Guttorm, Opdahl, Andreas L. (2010): Visualizing Cyber Attacks with Misuse Case Maps. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 262-275. http://dx.doi.org/10.1007/978-3-642-14192-8_24

Omoronyia, Inah, Sindre, Guttorm, Roper, Marc, Ferguson, John D., Wood, Murray (2009): Use Case to Source Code Traceability: The Developer Navigation View Point. In: RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009 , 2009, . pp. 237-242. http://doi.ieeecomputersociety.org/10.1109/RE.2009.26

Jaccheri, Maria Letizia, Sindre, Guttorm (2007): Software Engineering Students meet Interdisciplinary Project work and Art. In: IV 2007 - 11th International Conference on Information Visualisation 2-6 July, 2007, Zürich, Switzerland. pp. 925-934. http://doi.ieeecomputersociety.org/10.1109/IV.2007.102

Sindre, Guttorm (2007): Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, Peter, Paech, Barbara, Heymans, Patrick (eds.) Requirements Engineering Foundation for Software Quality, 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007, Proceedings , 2007, . pp. 355-366. http://dx.doi.org/10.1007/978-3-540-73031-6_27

Sindre, Guttorm, Opdahl, Andreas L. (2005): Eliciting security requirements with misuse cases. In Requir. Eng., 10 (1) pp. 34-44. http://www.springerlink.com/index/10.1007/s00766-004-0194-4

Krogstie, John, Sindre, Guttorm (1996): Utilizing Deonetic Operators in Information Systems Specification. In Requir. Eng., 1 (4) pp. . http://

Opdahl, Andreas L., Sindre, Guttorm (1996): Towards an Integrated, Simulative Framework for Real-World Modelling. In: HICSS 1996 , 1996, . pp. 515-524. http://csdl.computer.org/comp/proceedings/hicss/1996/7330/00/73300515abs.htm

Opdahl, Andreas L., Sindre, Guttorm (1995): Representing real-world processes. In: HICSS 1995 , 1995, . pp. 821-830. http://csdl.computer.org/comp/proceedings/hicss/1995/6945/00/69450821abs.htm

Sindre, Guttorm, Gulla, Bjørn, Jokstad, Håkon G. (1993): Onion graphs: aesthetics and layout. In: Proceedings of the 1993 IEEE Workshop on Visual Languages August 24-27, 1993, Bergen, Norway. pp. 287-291.