From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defining Security Requirements Through Misuse Actions., , , и . IFIP Workshop on Advanced Software Engineering, том 219 из IFIP, стр. 123-137. Springer, (2006)Embedding of Binomial Treas in Hypercubes with Link Faults., , и . J. Parallel Distributed Comput., 54 (1): 49-74 (1998)The Account Analysis Pattern., и . EuroPLoP, стр. 477-484. UVK - Universitaetsverlag Konstanz, (2002)An Analysis Pattern for Course Management., и . EuroPLoP, стр. 899-912. UVK - Universitaetsverlag Konstanz, (2003)The design of secure IoT applications using patterns: State of the art and directions for research., , , и . Internet Things, (2021)Two safety patterns: Safety Assertion and Safety Assertion Enforcer., и . EuroPLoP, стр. 30:1-30:9. ACM, (2017)Formal specification of real-time dependable systems., и . ICECCS, стр. 342-348. IEEE Computer Society, (1995)Panel Discussion: Managing Digital Identities - Challenges and Opportunities., , , , , и . TrustBus, том 4657 из Lecture Notes in Computer Science, стр. 2. Springer, (2007)Building Secure Systems: From Threats to Security Patterns., и . SCCC, стр. 66-70. IEEE Computer Society, (2010)An Approach to Model-based Development of Secure and Reliable Systems., , , и . ARES, стр. 260-265. IEEE Computer Society, (2011)