Author: Guttorm Sindre

Publications

Publication period start: 2009
Number of co-authors: 14

Co-authors

Number of publications with favourite co-authors
Murray Wood
1
Inah Omoronyia
2
Andreas L. Opdahl
4

Productive Colleagues

Most productive colleagues in number of publications
John Krogstie
7
Andreas L. Opdahl
9
Stefan Biffl
12

Publications

Sindre, Guttorm, Opdahl, Andreas L. (2005): Eliciting security requirements with misuse cases. In Requir. Eng., 10 (1) pp. 34-44. https://www.springerlink.com/index/10.1007/s00766-004-0194-4

Krogstie, John, Sindre, Guttorm (1996): Utilizing Deonetic Operators in Information Systems Specification. In Requir. Eng., 1 (4) pp. . https://

Opdahl, Andreas L., Sindre, Guttorm (1995): Representing real-world processes. In: HICSS 1995 , 1995, . pp. 821-830. https://csdl.computer.org/comp/proceedings/hicss/1995/6945/00/69450821abs.htm

Opdahl, Andreas L., Sindre, Guttorm (1996): Towards an Integrated, Simulative Framework for Real-World Modelling. In: HICSS 1996 , 1996, . pp. 515-524. https://csdl.computer.org/comp/proceedings/hicss/1996/7330/00/73300515abs.htm

Jaccheri, Maria Letizia, Sindre, Guttorm (2007): Software Engineering Students meet Interdisciplinary Project work and Art. In: IV 2007 - 11th International Conference on Information Visualisation 2-6 July, 2007, Zürich, Switzerland. pp. 925-934. https://doi.ieeecomputersociety.org/10.1109/IV.2007.102

Sindre, Guttorm, Gulla, Bjørn, Jokstad, Håkon G. (1993): Onion graphs: aesthetics and layout. In: Proceedings of the 1993 IEEE Workshop on Visual Languages August 24-27, 1993, Bergen, Norway. pp. 287-291.

Kárpáti, Péter, Sindre, Guttorm, Opdahl, Andreas L. (2010): Visualizing Cyber Attacks with Misuse Case Maps. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 262-275. https://dx.doi.org/10.1007/978-3-642-14192-8_24

Sindre, Guttorm (2007): Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, Peter, Paech, Barbara, Heymans, Patrick (eds.) Requirements Engineering Foundation for Software Quality, 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007, Proceedings , 2007, . pp. 355-366. https://dx.doi.org/10.1007/978-3-540-73031-6_27

Omoronyia, Inah, Sindre, Guttorm, Stålhane, Tor, Biffl, Stefan, Moser, Thomas, Sunindyo, Wikan Danar (2010): A Domain Ontology Building Process for Guiding Requirements Elicitation. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 188-202. https://dx.doi.org/10.1007/978-3-642-14192-8_18

Omoronyia, Inah, Sindre, Guttorm, Roper, Marc, Ferguson, John D., Wood, Murray (2009): Use Case to Source Code Traceability: The Developer Navigation View Point. In: RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009 , 2009, . pp. 237-242. https://doi.ieeecomputersociety.org/10.1109/RE.2009.26