Author of the publication

A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis.

, , , , , , and . CSMR, page 241-246. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bayesian network for IT governance performance prediction., , and . ICEC, volume 342 of ACM International Conference Proceeding Series, page 1:1-1:8. ACM, (2008)A Meta Language for Threat Modeling and Attack Simulations., , and . ARES, page 38:1-38:8. ACM, (2018)Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis., , , and . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook., , and . ICISSP, page 479-486. SciTePress, (2019)Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities., , , , and . ESSoS, volume 10379 of Lecture Notes in Computer Science, page 53-69. Springer, (2017)Extending a general theory of software to engineering., and . GTSE, page 36-39. ACM, (2014)Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling., , and . PoEM (Short Papers), volume 1023 of CEUR Workshop Proceedings, page 39-48. CEUR-WS.org, (2013)A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis., , , , , , and . CSMR, page 241-246. IEEE Computer Society, (2009)A Framework for Service Interoperability Analysis using Enterprise Architecture Models., , and . IEEE SCC (2), page 99-107. IEEE Computer Society, (2008)Re-using Enterprise Architecture Repositories for Agile Threat Modeling., , and . EDOC Workshops, page 118-127. IEEE, (2019)