From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method for assessing the business value of information system scenarios with an estimated credibility of the result., , и . Int. J. Serv. Technol. Manag., 13 (1/2): 105-133 (2010)A survey on CIO concerns-do enterprise architecture frameworks support them?, , , , и . Information Systems Frontiers, 8 (2): 81--90 (2006)Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs., , , и . CSR, стр. 304-311. IEEE, (2021)Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures., , и . CRITIS, том 7722 из Lecture Notes in Computer Science, стр. 240-251. Springer, (2012)Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach., , и . EDOC Workshops, стр. 1-8. IEEE Computer Society, (2016)Mapping the Substation Configuration Language of IEC 61850 to ArchiMate., , , , и . EDOCW, стр. 60-68. IEEE Computer Society, (2010)Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models., , и . HICSS, стр. 1-10. IEEE Computer Society, (2009)Effort Estimates for Vulnerability Discovery Projects., , и . HICSS, стр. 5564-5573. IEEE Computer Society, (2012)A framework for interoperability analysis on the semantic web using architecture models., , и . EDOCW, стр. 207-215. IEEE Computer Society, (2008)A probabilistic relational model for security risk analysis., , и . Comput. Secur., 29 (6): 659-679 (2010)