Author of the publication

S2D-ProM: A Strategy Oriented Process Model for Secure Software Development.

, , and . ICSEA, page 24. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model-Driven Framework for the Modeling and the Description of Data-as-a-Service to Assist Service Selection and Composition., , , , and . DEXA (1), volume 11706 of Lecture Notes in Computer Science, page 396-406. Springer, (2019)Guidance in Web Applications Design., , and . MoDISE-EUS, volume 341 of CEUR Workshop Proceedings, page 114-125. CEUR-WS.org, (2008)Comparative Study of Arabic Stemming Algorithms for Topic Identification., , and . KES, volume 159 of Procedia Computer Science, page 794-802. Elsevier, (2019)Detection of Users' Abnormal Behavior on Social Networks., , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 617-629. Springer, (2020)Semantic search using modular ontology learning and case-based reasoning., , , and . EDBT/ICDT Workshops, ACM, (2010)Multi-document Arabic Text Summarization based on Thematic Annotation., , and . ICSOFT, page 639-644. SCITEPRESS, (2021)Feedback control based model of QoS management approaches in Real-Time databases., , and . RCIS, page 409-414. IEEE, (2008)Towards an Intelligent User Centered Search Engine for COTS Components., , and . Software Engineering Research and Practice, page 466-472. CSREA Press, (2010)A Model Based Framework Supporting ITIL Service IT Management., , , and . BMMDS/EMMSAD, volume 50 of Lecture Notes in Business Information Processing, page 208-219. Springer, (2010)A Process Mining-Based Solution for Business Process Model Extension with Cost Perspective Context-Based Cost Data Analysis and Case Study., , and . CISIM, volume 11127 of Lecture Notes in Computer Science, page 434-446. Springer, (2018)