Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudSurfer - A Cloud Broker Application for Security Concerns., , , , , , , and . CLOSER, page 199-206. SciTePress, (2013)An experimental evaluation of bow-tie analysis for security., , , , and . Inf. Comput. Secur., (2019)Evaluating the Impact of ChatGPT on Exercises of a Software Security Course., , , , and . ESEM, page 1-6. IEEE, (2023)Visualizing Cyber Security Risks with Bow-Tie Diagrams., , , , and . GraMSec@CSF, volume 10744 of Lecture Notes in Computer Science, page 38-56. Springer, (2017)Linkcare - Enabling Continuity of Care for the Chronically Ill across Levels and Profession., , , and . MedInfo, volume 129 of Studies in Health Technology and Informatics, page 3-7. IOS Press, (2007)When to Treat Security Risks with Cyber Insurance., and . CyberSA, page 1-8. IEEE, (2018)Aniketos: Challenges and Results., , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 234-235. Springer, (2012)Security Requirements for the Rest of Us: A Survey., , and . IEEE Softw., 25 (1): 20-27 (2008)On the Certificate Revocation Problem in the Maritime Sector., , , and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 142-157. Springer, (2020)Thunder in the Clouds: Security challenges and solutions for federated Clouds., , , and . CloudCom, page 113-120. IEEE Computer Society, (2012)