From post

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.

, , , , и . ESSoS, том 7159 из Lecture Notes in Computer Science, стр. 14-21. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Welcome from the ESPRE 2020 Organisers., , , и . ESPRE@RE, стр. vi. IEEE, (2020)A Structured Comparison of Social Engineering Intelligence Gathering Tools., , , и . TrustBus, том 10442 из Lecture Notes in Computer Science, стр. 232-246. Springer, (2017)Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS., , , и . CODASPY, стр. 119-126. ACM, (2018)Holistic security requirements analysis: An attacker's perspective., , , , и . RE, стр. 282-283. IEEE Computer Society, (2015)A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology., , и . HAISA, стр. 241-251. University of Plymouth, (2016)How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?, , , и . PROFES, том 12562 из Lecture Notes in Computer Science, стр. 69-87. Springer, (2020)Towards continuous security compliance in agile software development at scale., , , , и . RCoSE@ICSE, стр. 31-34. ACM, (2018)A Serious Game for Eliciting Social Engineering Security Requirements., и . RE, стр. 16-25. IEEE Computer Society, (2016)A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain., , и . SAFECOMP, том 10488 из Lecture Notes in Computer Science, стр. 305-319. Springer, (2017)On the Requirements for Serious Games Geared Towards Software Developers in the Industry., , , и . RE, стр. 286-296. IEEE, (2019)