Direkt zur zweiten Navigationsebene, fallls vorhanden.Direkt zum Seiteninhalt
www.m-chair.de | @mchair | Imprint | Sitemap
Logo - Johann Wolfgang Goethe University Frankfurt
Deutsche Telekom Chair of Mobile Business & Multilateral SecurityDeutsche TelekomDeutsche Telekom Chair of Mobile Business & Multilateral Security
images/documents/staff/ASY.jpg
Functions:
  • Research Assistant
Phone & Fax:
+49 (0) 69 / 798 34 699 (Phone)
+49 (0) 69 / 798 35004 (Fax)
Address:
Theodor-W.-Adorno-Platz 4
Office 2.236, RuW Building
D-60323 Frankfurt am Main
Research Interests
  • Fraud risk assessment
  • Socio-technical systems security
  • Risk modelling and analysis approaches
  • Design and requirement engineering
  • Secure software development
Curriculum Vitae

Ahmed Seid Yesuf holds his bachelor degree in the field of Computer Science and IT with a distinction in Haramaya University, Ethiopia in 2009 and he holds his M.Sc. degree in computer science (Informatics) with specialisation of Design and Engineering in Oct 2013 in Trento University, Italy. His thesis concentrates on implementing a framework for a context-aware and computer-aided attack tree modelling approach for software development. He has done his internship and M.Sc. thesis in SAP Next Business and Research Karlsruhe, Germany.
Since November 2013, he is working as a research and teaching assistant and PhD student at the chair of Mobile Business and Multilateral Security at Johann Wolfgang Goethe University in Frankfurt (Germany).
(Contact by email for detailed CV)

Email: ahmed[dot]yesuf[at]m-chair[dot]de

Publications

Refereed Publications

Reviewed Project Publications

  • Ahmed S. Yesuf, R. Wieringa, L. Wolos, M. Ford, S. Bleikertz, M. Martins, S. Saraiva, M. Fraile. 2015. "Final Requirements for Implementation of Case Studies (D7.1.2)", http://www.trespass-project.eu/, TREsPASS.
  • S. Bleikertz, J.-W. Bullée, M. Ford, O. Gadyatskaya, D. Gollmann, R.R. Hansen, D. Ionita, H. Jonkers, L. Mon- toya, C.W. Probst, S. Saraiva, A. Tanner, S. Übelacker, L. Wolos, A.S. Yesuf. 2015. "Extensibility of Socio-Technical Security Models (D1.3.2)", https://www.trespass-project.eu/sites/default/files/Deliverables/D1_3_2.pdf, TREsPASS.
  • S. Bleikertz, J.W. Bullée, M. Ford, D. Ionita, H. Jonkers, L. Montoya, S. Saraiva, A. Tan- ner, A.S. Yesuf, J. Willemson, C.W. Probst. 2015. "Dynamic features of socio-technical security models (D1.3.3)", https://www.trespass-project.eu/sites/default/files/Deliverables/D1_3_3.pdf, TREsPASS.
  • M. Ford A. Lenin, O. Gadyatskaya, D. Ionita, A. Tan- ner, S. Saraiva. 2015. "First report on the integrated TREsPASS process (D5.4.1)".
  • Ahmed S. Yesuf, Lars Wolos, Roel Wieringa, Dan Ionita, Margaret Ford. 2014. "Results from Case Study B: Telecommunication Services (D7.3.1)", http://www.trespass-project.eu/, TREsPASS.
  • Jan-Willem Bullée, Sören Bleikertz, Mar- garet Ford, René Rydhof Hansen, Ma- rieta Georgieva Ivanova, Lorena Mon- toya, Christian W. Probst, Sven Übelacker, Ahmed S. Yesuf. 2014. "Initial Policy-Specification Language (D1.2.1)", http://www.trespass-project.eu/, TREsPASS.