Basel Katt
About
Leader of the Information Security Dicipline
Reseach areas:
- Software security and security testing
- Software vulnerability analysis
- Model driven software development and model driven security
- Access control, usage control and privacy protection
- Security monitoring, policies, languages, models and enforcement
Publications
2022
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2022)
Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges.
Computers & Security.
volum 116.
Academic article
-
Yamin, Muhammad Mudassar;
Ullah, Mohib;
Ullah, Habib;
Katt, Basel;
Hijji, Mohammad;
Muhammad, Khan.
(2022)
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security.
Mathematics.
volum 10 (12).
Academic article
2021
-
Langås, Mari;
Løfqvist, Sanna;
Katt, Basel;
Haugan, Thomas Sagvold;
Jaatun, Martin Gilje.
(2021)
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the 2021 European Interdisciplinary Cybersecurity Conference (EICC).
Academic chapter/article/Conference paper
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2021)
Difficult SQLi Code Patterns for Static Code Analysis Tools.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 3.
Academic article
-
Wen, Shao-Fang;
Yamin, Muhammad Mudassar;
Katt, Basel.
(2021)
Ontology-Based Scenario Modeling for Cyber Security Exercise.
2021 IEEE European Symposium on Security and Privacy Workshops.
Academic chapter/article/Conference paper
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Nowostawski, Mariusz.
(2021)
Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises.
Computers & Security.
volum 110.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Torseth, Espen.
(2021)
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study.
Lecture Notes in Computer Science (LNCS).
volum 12776.
Academic article
-
Yamin, Muhammad Mudassar;
Ullah, Mohib;
Ullah, Habib;
Katt, Basel.
(2021)
Weaponized AI for cyber attacks.
Journal of Information Security and Applications.
volum 57.
Academic article
2020
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2020)
Difficult XSS Code Patterns for Static Code Analysis Tools.
Lecture Notes in Computer Science (LNCS).
volum 11981 LNCS.
Academic article
-
Seljeseth, Mats;
Yamin, Muhammad Mudassar;
Katt, Basel.
(2020)
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices.
Sensors.
volum 20 (22).
Academic article
-
Shukla, Ankur;
Katt, Basel;
Nweke, Livinus Obiora.
(2020)
Vulnerability Discovery Modelling With Vulnerability Severity.
2019 IEEE Conference on Information and Communication Technology.
Academic chapter/article/Conference paper
-
Yamin, Muhammad Mudassar;
Shalaginov, Andrii;
Katt, Basel.
(2020)
Smart Policing for a Smart World Opportunities, Challenges and Way Forward.
Advances in Intelligent Systems and Computing.
Academic article
-
Østby, Grethe;
Katt, Basel.
(2020)
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management.
Proceedings of the 6th International Conference on Information Systems Security and Privacy.
Academic chapter/article/Conference paper
-
Østby, Grethe;
Kowalski, Stewart James;
Katt, Basel.
(2020)
Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap.
CEUR Workshop Proceedings.
volum 2789.
Academic article
-
Østby, Grethe;
Lovell, Kieren N.;
Katt, Basel.
(2020)
EXCON Teams in Cyber Security Training.
2019 International Conference on Computational Science and Computational Intelligence (CSCI).
Academic chapter/article/Conference paper
2019
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach.
Journal of Advances in Information Technology.
volum 10 (3).
Academic article
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment.
ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security Canterbury, CA, United Kingdom — August 26 - 29, 2019.
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Managing Software Security Knowledge in Context: An Ontology Based Approach.
Information.
volum 10 (6).
Academic article
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security.
Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering 2019 (EASE '19).
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Towards a Context-Based Approach for Software Security Learning.
Journal of Applied Security Research.
volum 14 (3).
Academic article
-
Wen, Shao-Fang;
Kianpour, Mazaher;
Katt, Basel.
(2019)
Security Knowledge Management in Open Source Software Communities.
Innovative Security Solutions for Information Technology and Communications. SECITC 2018.
Academic chapter/article/Conference paper
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2019)
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain.
CEUR Workshop Proceedings.
volum 2381.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Gkioulos, Vasileios.
(2019)
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture.
Computers & Security.
volum 88:101636.
Academic literature review
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Gkioulos, Vasileios.
(2019)
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring.
Lecture Notes in Networks and Systems.
volum 70 LNNS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Kianpour, Mazaher.
(2019)
Cyber Weapons Storage Mechanisms.
Lecture Notes in Computer Science (LNCS).
volum 11611 LNCS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Sattar, Kashif;
Bin Ahmad, Maaz.
(2019)
Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics.
Lecture Notes in Networks and Systems.
volum LNNS 70.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2019)
A Survey of Automated Information Exchange Mechanisms Among CERTs.
CEUR Workshop Proceedings.
volum 2348.
Academic article
-
Østby, Grethe;
Berg, Lars;
Kianpour, Mazaher;
Katt, Basel;
Kowalski, Stewart James.
(2019)
A Socio-Technical Framework to Improve cyber security training: A Work in Progress.
CEUR Workshop Proceedings.
volum 2398.
Academic article
-
Østby, Grethe;
Katt, Basel.
(2019)
Cyber Crisis Management Roles – A Municipality Responsibility Case Study.
Information Technology in Disaster Risk Reduction.
Academic chapter/article/Conference paper
2018
-
Schuckert, Felix;
Hildner, Max;
Katt, Basel;
Langweg, Hanno.
(2018)
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox.
SICHERHEIT 2018.
Academic chapter/article/Conference paper
-
Schuckert, Felix;
Hildner, Max;
Katt, Basel;
Langweg, Hanno.
(2018)
Source Code Patterns of Cross Site Scripting in PHP Open Source Projects.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 11.
Academic article
-
Weldehawaryat, Goitom Kahsay;
Katt, Basel.
(2018)
Towards a Quantitative Approach for Security Assurance Metrics.
The Twelfth International Conference on Emerging Security Information, Systems and Technologies; SECURWARE 2018 September 16, 2018 to September 20, 2018 - Venice, Italy.
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2018)
An Ontology-Based Context Model for Managing Security Knowledge in Software Development.
Proceedings of the 23rd Conference of Open Innovations Association FRUCT.
Academic chapter/article/Conference paper
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2018)
Detecting Malicious Windows Commands Using Natural Language Processing Techniques.
Lecture Notes in Computer Science (LNCS).
volum 11359 LNCS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2018)
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper.
CEUR Workshop Proceedings.
volum 2269.
Academic article
-
Zoto, Erjon;
Kowalski, Stewart James;
Frantz, Christopher Konstantin;
Lopez Rojas, Edgar Alonso;
Katt, Basel.
(2018)
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
IFIP Advances in Information and Communication Technology.
volum 531.
Academic article
-
Zoto, Erjon;
Kowalski, Stewart James;
Frantz, Christopher;
Lopez Rojas, Edgar Alonso;
Katt, Basel.
(2018)
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Information Security Education - Towards a Cybersecure Society.
Academic chapter/article/Conference paper
-
Zoto, Erjon;
Kowalski, Stewart James;
Katt, Basel;
Frantz, Christopher;
Lopez Rojas, Edgar Alonso.
(2018)
CyberAIMs: A tool for teaching adversarial and systems thinking.
International Defence and Homeland Security Simulation Workshop, DHSS 2018.
Academic chapter/article/Conference paper
2017
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2017)
Source Code Patterns of SQL Injection Vulnerabilities.
ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017.
Academic chapter/article/Conference paper
2015
-
Katt, Basel;
Felderer, Michael.
(2015)
A process for mastering security evolution in the development lifecycle.
International Journal on Software Tools for Technology Transfer (STTT).
volum 17.
Academic article
2013
-
Gander, Matthias;
Katt, Basel;
Felderer, Michael;
Breu, Ruth.
(2013)
Towards a Model- and Learning-Based Framework for Security Anomaly Detection.
Formal Methods for Components and Objects.
Academic chapter/article/Conference paper
-
Katt, Basel;
Gander, Matthias;
Breu, Ruth;
Felderer, Michael.
(2013)
Enhancing Model Driven Security through Pattern Refinement Techniques.
Formal Methods for Components and Objects.
Academic chapter/article/Conference paper
2012
-
Gander, Matthias;
Felderer, Michael;
Katt, Basel;
Breu, Ruth.
(2012)
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.
Leveraging Applications of Formal Methods, Verification, and Validation.
Academic chapter/article/Conference paper
-
Gander, Matthias;
Katt, Basel;
Felderer, Michael;
Tolbaru, Adrian;
Breu, Ruth;
Moschitti, A..
(2012)
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning.
Trustworthy Eternal Systemsvia Evolving Software, Data and Knowledge..
Academic chapter/article/Conference paper
-
Trojer, Thomas;
Katt, Basel;
Breu, Ruth;
Schabetsberger, Thomas;
Mair, Richard.
(2012)
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies.
International Journal of Computational Models and Algorithms in Medicine (IJCMAM).
Academic article
-
Trojer, Thomas;
Katt, Basel;
Schabetsberger, Thomas;
Breu, Ruth;
Mair, Richard.
(2012)
The Process of Policy Authoring of Patient-Controlled Privacy Preferences.
Electronic Healthcare.
Academic chapter/article/Conference paper
2010
-
Katt, Basel;
Trojer, Thomas;
Breu, Ruth;
Schabetsberger, Thomas;
Wozak, Florian.
(2010)
cover Meeting EHR Security Requirements: SeAAS Approach.
Seamless Care – Safe Care.
Academic chapter/article/Conference paper
Journal publications
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2022)
Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges.
Computers & Security.
volum 116.
Academic article
-
Yamin, Muhammad Mudassar;
Ullah, Mohib;
Ullah, Habib;
Katt, Basel;
Hijji, Mohammad;
Muhammad, Khan.
(2022)
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security.
Mathematics.
volum 10 (12).
Academic article
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2021)
Difficult SQLi Code Patterns for Static Code Analysis Tools.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 3.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Nowostawski, Mariusz.
(2021)
Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises.
Computers & Security.
volum 110.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Torseth, Espen.
(2021)
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study.
Lecture Notes in Computer Science (LNCS).
volum 12776.
Academic article
-
Yamin, Muhammad Mudassar;
Ullah, Mohib;
Ullah, Habib;
Katt, Basel.
(2021)
Weaponized AI for cyber attacks.
Journal of Information Security and Applications.
volum 57.
Academic article
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2020)
Difficult XSS Code Patterns for Static Code Analysis Tools.
Lecture Notes in Computer Science (LNCS).
volum 11981 LNCS.
Academic article
-
Seljeseth, Mats;
Yamin, Muhammad Mudassar;
Katt, Basel.
(2020)
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices.
Sensors.
volum 20 (22).
Academic article
-
Yamin, Muhammad Mudassar;
Shalaginov, Andrii;
Katt, Basel.
(2020)
Smart Policing for a Smart World Opportunities, Challenges and Way Forward.
Advances in Intelligent Systems and Computing.
Academic article
-
Østby, Grethe;
Kowalski, Stewart James;
Katt, Basel.
(2020)
Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap.
CEUR Workshop Proceedings.
volum 2789.
Academic article
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach.
Journal of Advances in Information Technology.
volum 10 (3).
Academic article
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Managing Software Security Knowledge in Context: An Ontology Based Approach.
Information.
volum 10 (6).
Academic article
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Towards a Context-Based Approach for Software Security Learning.
Journal of Applied Security Research.
volum 14 (3).
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2019)
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain.
CEUR Workshop Proceedings.
volum 2381.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Gkioulos, Vasileios.
(2019)
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture.
Computers & Security.
volum 88:101636.
Academic literature review
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Gkioulos, Vasileios.
(2019)
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring.
Lecture Notes in Networks and Systems.
volum 70 LNNS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Kianpour, Mazaher.
(2019)
Cyber Weapons Storage Mechanisms.
Lecture Notes in Computer Science (LNCS).
volum 11611 LNCS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel;
Sattar, Kashif;
Bin Ahmad, Maaz.
(2019)
Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics.
Lecture Notes in Networks and Systems.
volum LNNS 70.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2019)
A Survey of Automated Information Exchange Mechanisms Among CERTs.
CEUR Workshop Proceedings.
volum 2348.
Academic article
-
Østby, Grethe;
Berg, Lars;
Kianpour, Mazaher;
Katt, Basel;
Kowalski, Stewart James.
(2019)
A Socio-Technical Framework to Improve cyber security training: A Work in Progress.
CEUR Workshop Proceedings.
volum 2398.
Academic article
-
Schuckert, Felix;
Hildner, Max;
Katt, Basel;
Langweg, Hanno.
(2018)
Source Code Patterns of Cross Site Scripting in PHP Open Source Projects.
Norsk Informasjonssikkerhetskonferanse (NISK).
volum 11.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2018)
Detecting Malicious Windows Commands Using Natural Language Processing Techniques.
Lecture Notes in Computer Science (LNCS).
volum 11359 LNCS.
Academic article
-
Yamin, Muhammad Mudassar;
Katt, Basel.
(2018)
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper.
CEUR Workshop Proceedings.
volum 2269.
Academic article
-
Zoto, Erjon;
Kowalski, Stewart James;
Frantz, Christopher Konstantin;
Lopez Rojas, Edgar Alonso;
Katt, Basel.
(2018)
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
IFIP Advances in Information and Communication Technology.
volum 531.
Academic article
-
Katt, Basel;
Felderer, Michael.
(2015)
A process for mastering security evolution in the development lifecycle.
International Journal on Software Tools for Technology Transfer (STTT).
volum 17.
Academic article
-
Trojer, Thomas;
Katt, Basel;
Breu, Ruth;
Schabetsberger, Thomas;
Mair, Richard.
(2012)
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies.
International Journal of Computational Models and Algorithms in Medicine (IJCMAM).
Academic article
Part of book/report
-
Langås, Mari;
Løfqvist, Sanna;
Katt, Basel;
Haugan, Thomas Sagvold;
Jaatun, Martin Gilje.
(2021)
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the 2021 European Interdisciplinary Cybersecurity Conference (EICC).
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Yamin, Muhammad Mudassar;
Katt, Basel.
(2021)
Ontology-Based Scenario Modeling for Cyber Security Exercise.
2021 IEEE European Symposium on Security and Privacy Workshops.
Academic chapter/article/Conference paper
-
Shukla, Ankur;
Katt, Basel;
Nweke, Livinus Obiora.
(2020)
Vulnerability Discovery Modelling With Vulnerability Severity.
2019 IEEE Conference on Information and Communication Technology.
Academic chapter/article/Conference paper
-
Østby, Grethe;
Katt, Basel.
(2020)
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management.
Proceedings of the 6th International Conference on Information Systems Security and Privacy.
Academic chapter/article/Conference paper
-
Østby, Grethe;
Lovell, Kieren N.;
Katt, Basel.
(2020)
EXCON Teams in Cyber Security Training.
2019 International Conference on Computational Science and Computational Intelligence (CSCI).
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment.
ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security Canterbury, CA, United Kingdom — August 26 - 29, 2019.
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2019)
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security.
Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering 2019 (EASE '19).
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Kianpour, Mazaher;
Katt, Basel.
(2019)
Security Knowledge Management in Open Source Software Communities.
Innovative Security Solutions for Information Technology and Communications. SECITC 2018.
Academic chapter/article/Conference paper
-
Østby, Grethe;
Katt, Basel.
(2019)
Cyber Crisis Management Roles – A Municipality Responsibility Case Study.
Information Technology in Disaster Risk Reduction.
Academic chapter/article/Conference paper
-
Schuckert, Felix;
Hildner, Max;
Katt, Basel;
Langweg, Hanno.
(2018)
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox.
SICHERHEIT 2018.
Academic chapter/article/Conference paper
-
Weldehawaryat, Goitom Kahsay;
Katt, Basel.
(2018)
Towards a Quantitative Approach for Security Assurance Metrics.
The Twelfth International Conference on Emerging Security Information, Systems and Technologies; SECURWARE 2018 September 16, 2018 to September 20, 2018 - Venice, Italy.
Academic chapter/article/Conference paper
-
Wen, Shao-Fang;
Katt, Basel.
(2018)
An Ontology-Based Context Model for Managing Security Knowledge in Software Development.
Proceedings of the 23rd Conference of Open Innovations Association FRUCT.
Academic chapter/article/Conference paper
-
Zoto, Erjon;
Kowalski, Stewart James;
Frantz, Christopher;
Lopez Rojas, Edgar Alonso;
Katt, Basel.
(2018)
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Information Security Education - Towards a Cybersecure Society.
Academic chapter/article/Conference paper
-
Zoto, Erjon;
Kowalski, Stewart James;
Katt, Basel;
Frantz, Christopher;
Lopez Rojas, Edgar Alonso.
(2018)
CyberAIMs: A tool for teaching adversarial and systems thinking.
International Defence and Homeland Security Simulation Workshop, DHSS 2018.
Academic chapter/article/Conference paper
-
Schuckert, Felix;
Katt, Basel;
Langweg, Hanno.
(2017)
Source Code Patterns of SQL Injection Vulnerabilities.
ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017.
Academic chapter/article/Conference paper
-
Gander, Matthias;
Katt, Basel;
Felderer, Michael;
Breu, Ruth.
(2013)
Towards a Model- and Learning-Based Framework for Security Anomaly Detection.
Formal Methods for Components and Objects.
Academic chapter/article/Conference paper
-
Katt, Basel;
Gander, Matthias;
Breu, Ruth;
Felderer, Michael.
(2013)
Enhancing Model Driven Security through Pattern Refinement Techniques.
Formal Methods for Components and Objects.
Academic chapter/article/Conference paper
-
Gander, Matthias;
Felderer, Michael;
Katt, Basel;
Breu, Ruth.
(2012)
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.
Leveraging Applications of Formal Methods, Verification, and Validation.
Academic chapter/article/Conference paper
-
Gander, Matthias;
Katt, Basel;
Felderer, Michael;
Tolbaru, Adrian;
Breu, Ruth;
Moschitti, A..
(2012)
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning.
Trustworthy Eternal Systemsvia Evolving Software, Data and Knowledge..
Academic chapter/article/Conference paper
-
Trojer, Thomas;
Katt, Basel;
Schabetsberger, Thomas;
Breu, Ruth;
Mair, Richard.
(2012)
The Process of Policy Authoring of Patient-Controlled Privacy Preferences.
Electronic Healthcare.
Academic chapter/article/Conference paper
-
Katt, Basel;
Trojer, Thomas;
Breu, Ruth;
Schabetsberger, Thomas;
Wozak, Florian.
(2010)
cover Meeting EHR Security Requirements: SeAAS Approach.
Seamless Care – Safe Care.
Academic chapter/article/Conference paper
Teaching
Courses
Media
2019
-
Academic lectureYamin, Muhammad Mudassar; Katt, Basel. (2019) Cyber Security Skill Set Analysis for Common Curricula Development. Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19 . ACM; University of Kent. 2019-08-26 - 2019-08-29.
-
Academic lectureYamin, Muhammad Mudassar; Katt, Basel. (2019) Mobile device management (MDM) technologies, issues and challenges. 3rd International Conference on Cryptography, Security and Privacy . ACM; Kuala Lumpur. 2019-01-19 - 2019-01-21.
-
Academic lectureYamin, Muhammad Mudassar; Katt, Basel. (2019) Modeling Attack and Defense Scenarios for Cyber Security Exercises. 5th Interdisciplinary Cyber Research conference 2019 . Tallinn University of Technology; Tallin. 2019-06-29 - 2019-06-29.
2018
-
Academic lectureKatt, Basel; Nishu, Prasher. (2018) Quantitative security assurance metrics - REST API case studies. Proceedings of the 12th European Conference on Software Architecture ; 2018-09-24 - 2018-09-28.
-
PosterYamin, Muhammad Mudassar; Katt, Basel. (2018) Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges. Nordsec 2018 . University of Oslo; Oslo. 2018-11-28 - 2018-11-30.
-
LectureYamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios; Espen, Torseth; Kowalski, Stewart James. (2018) Make it and break it - An IoT smart home testbed case study. International Conference on Cyber Physical Systems and IoT(CPSIOT 2018) . ACM; Stolkholm. 2018-09-21 - 2018-09-23.
2014
-
Academic lectureTrojer, Thomas; Katt, Basel; Breu, Ruth; Schabetsberger, Thomas; Mair, Richard. (2014) Scenario-Based Templates Supporting Usable Privacy Policy Authoring. University of Amsterdam, Amsterdam Privacy Conference 2012 (APC 2012) ; 2014-06-18 - 2014-06-18.
-
Academic lectureTrojer, Thomas; Katt, Basel; Özata, Tülay; Breu, Ruth; Mangesius, Patrick; Schabetsberger, Thomas. (2014) Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective. 2014 47th Hawaii International Conference on System Sciences ; 2014-01-06 - 2014-01-09.
-
LectureZech, Philipp; Katt, Basel. (2014) Security Test Generation by Answer Set Programming. In the 8th International Conference on Software Security and Reliability ; 2014-06-30 - 2014-07-02.
2012
-
Academic lectureTrojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard. (2012) Considering privacy and effectiveness of authorization policies for shared electronic health records. IHI '12 Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium ; 2012-01-28 - 2012-01-30.
2010
-
Academic lectureRempel, Patrick; Katt, Basel; Breu, Ruth. (2010) Supporting Role Based Provisioning with Rules Using OWL and F-Logic. On the Move to Meaningful Internet Systems: OTM 2010. OTM 2010 ; 2010-10-25 - 2010-10-29.
2008
-
Academic lectureBreu, Ruth; Lechner, Alexander; Willburger, Mathias; Katt, Basel. (2008) Workflow Testing. Leveraging Applications of Formal Methods (ISoLA 2008) ; 2008-10-13 - 2008-10-16.
-
Academic lectureKatt, Basel; Breu, Ruth; Hafner, Michael; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian. (2008) Privacy and Access Control for IHE-Based Systems. Electronic Healthcare. eHealth 2008 ; 2008-09-08 - 2008-09-09.
-
Academic lectureKatt, Basel; Hafner, Michael. (2008) Model-Driven Policy Framework for Usage Control-based Privacy. the second International workshop on Model-based Design Of Trustworthy Health Information Systems (MOTHIS) ; 2008-09-28 - 2008-10-03.
-
LectureKatt, Basel; Zhang, Xinwen; Breu, Ruth; Felderer, Michael; Hafner, Michael; Seifert, Jean-Pierre. (2008) A general obligation model and continuity enhanced policy enforcement engine for usage control. SACMAT '08 Proceedings of the 13th ACM symposium on Access control models and technologies ; 2008-06-11 - 2008-06-13.