From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Bayesian network for IT governance performance prediction., , и . ICEC, том 342 из ACM International Conference Proceeding Series, стр. 1:1-1:8. ACM, (2008)A Meta Language for Threat Modeling and Attack Simulations., , и . ARES, стр. 38:1-38:8. ACM, (2018)Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling., , и . PoEM (Short Papers), том 1023 из CEUR Workshop Proceedings, стр. 39-48. CEUR-WS.org, (2013)Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook., , и . ICISSP, стр. 479-486. SciTePress, (2019)Extending a general theory of software to engineering., и . GTSE, стр. 36-39. ACM, (2014)Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities., , , , и . ESSoS, том 10379 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2017)A Framework for Service Interoperability Analysis using Enterprise Architecture Models., , и . IEEE SCC (2), стр. 99-107. IEEE Computer Society, (2008)Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis., , , и . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis., , , , , , и . CSMR, стр. 241-246. IEEE Computer Society, (2009)Towards Automated Attack Simulations of BPMN-based Processes., , и . EDOC, стр. 182-191. IEEE, (2021)