From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis., , , и . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)A Bayesian network for IT governance performance prediction., , и . ICEC, том 342 из ACM International Conference Proceeding Series, стр. 1:1-1:8. ACM, (2008)An Enterprise Architecture framework for application consolidation in the Swedish Armed Forces., и . EDOCW, стр. 264-273. IEEE Computer Society, (2009)A Meta Language for Threat Modeling and Attack Simulations., , и . ARES, стр. 38:1-38:8. ACM, (2018)The IT Organization Modeling and Assessment Tool for IT Governance Decision Support., , и . CAiSE, том 5074 из Lecture Notes in Computer Science, стр. 258-261. Springer, (2008)How to Develop a General Theory of Software Engineering: Report on the GTSE 2014 Workshop., , , , , , и . ACM SIGSOFT Softw. Eng. Notes, 39 (6): 23-25 (2014)A Method for Constructing a Company Specific Enterprise Architecture Model Framework., , и . SNPD, стр. 346-351. IEEE Computer Society, (2009)A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis., , , , , , и . CSMR, стр. 241-246. IEEE Computer Society, (2009)Architectural Integration Styles for Large-Scale Enterprise Software Systems., и . EDOC, стр. 224-236. IEEE Computer Society, (2001)A Framework for Service Interoperability Analysis using Enterprise Architecture Models., , и . IEEE SCC (2), стр. 99-107. IEEE Computer Society, (2008)