Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliciting security requirements with misuse cases, and . Requir. Eng., 10 (1): 34--44 (2005)An Analytical Evaluation of BPMN Using a Semiotic Quality Framework., and . EMMSAD, volume 363 of CEUR Workshop Proceedings, page 147-158. CEUR-WS.org, (2005)Preface., , , and . CAiSE Forum, volume 247 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?, and . I3E, volume 11701 of Lecture Notes in Computer Science, page 585-596. Springer, (2019)The Ransomware-as-a-Service economy within the darknet., , and . Comput. Secur., (2020)Improving the Information Security Model by using TFI., , and . SEC, volume 232 of IFIP, page 73-84. Springer, (2007)Towards a Deeper Understanding of Quality in Requirements Engineering, , and . CAiSE, volume 932 of Lecture Notes in Computer Science, page 82-95. Springer, (1995)Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams., and . MoDELS, volume 5301 of Lecture Notes in Computer Science, page 721-735. Springer, (2008)A Netnographic Study on the Dark Net Ecosystem for Ransomware., , and . CyberSA, page 1-8. IEEE, (2018)Diagram Notations for Mobile Work Processes., and . PoEM, volume 92 of Lecture Notes in Business Information Processing, page 52-66. Springer, (2011)