Author of the publication

Decision support oriented Enterprise Architecture metamodel management using classification trees.

, , , , and . EDOCW, page 328-335. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities., , , , and . ESSoS, volume 10379 of Lecture Notes in Computer Science, page 53-69. Springer, (2017)Extending a general theory of software to engineering., and . GTSE, page 36-39. ACM, (2014)A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis., , , , , , and . CSMR, page 241-246. IEEE Computer Society, (2009)A Bayesian network for IT governance performance prediction., , and . ICEC, volume 342 of ACM International Conference Proceeding Series, page 1:1-1:8. ACM, (2008)Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis., , , and . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook., , and . ICISSP, page 479-486. SciTePress, (2019)Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling., , and . PoEM (Short Papers), volume 1023 of CEUR Workshop Proceedings, page 39-48. CEUR-WS.org, (2013)A Meta Language for Threat Modeling and Attack Simulations., , and . ARES, page 38:1-38:8. ACM, (2018)A Framework for Service Interoperability Analysis using Enterprise Architecture Models., , and . IEEE SCC (2), page 99-107. IEEE Computer Society, (2008)Research communities in cyber security vulnerability assessments: A comprehensive literature review., , and . Comput. Sci. Rev., (May 2023)