From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach., , и . Domain-Specific Conceptual Modeling, Springer, (2016)Supporting Secure Business Process Design via Security Process Patterns., , и . BPMDS/EMMSAD@CAiSE, том 287 из Lecture Notes in Business Information Processing, стр. 19-33. Springer, (2017)Towards the Derivation of Secure Business Process Designs., , и . ER Workshops, том 9382 из Lecture Notes in Computer Science, стр. 248-258. Springer, (2015)Selecting a Cloud Service Provider in the age of cybercrime., и . Comput. Secur., (2013)A framework to support alignment of secure software engineering with legal regulations., , и . Softw. Syst. Model., 10 (3): 369-394 (2011)Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)., , и . EANN, том 1000 из Communications in Computer and Information Science, стр. 476-487. Springer, (2019)Security-Aware Elasticity for NoSQL Databases., , , и . MEDI, том 9344 из Lecture Notes in Computer Science, стр. 181-197. Springer, (2015)Apparatus: A framework for security analysis in internet of things systems., , , и . Ad Hoc Networks, (2019)An architectural description language for secure Multi-Agent Systems., , , и . Web Intell. Agent Syst., 8 (1): 99-122 (2010)Cyber-attack path discovery in a dynamic supply chain maritime risk management system., , и . Comput. Stand. Interfaces, (2018)