Author of the publication

A Combined Security Ontology based on the Unified Foundational Ontology.

, , and . ICSC, page 187-194. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can we do useful industrial software engineering research in the shadow of lean and agile?, , , and . CESI@ICSE, page 67-68. IEEE Computer Society, (2013)Impediments for Automated Testing - An Empirical Analysis of a User Support Discussion Board., , , and . ICST, page 113-122. IEEE Computer Society, (2014)Technical Debt in Test Automation., , , and . ICST, page 887-892. IEEE Computer Society, (2012)'State of the Art' in Using Agile Methods for Embedded Systems Development., , and . COMPSAC (2), page 522-527. IEEE Computer Society, (2009)978-0-7695-3726-9.Liability for software in safety-critical mechatronic systems: An industrial questionnaire., , , and . SEES@ICSE, page 44-50. IEEE, (2012)Formal verification of an autonomous wheel loader by model checking., , , and . FormaliSE@ICSE, page 74-83. ACM, (2018)A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard Ontology., , and . SEAA, page 301-304. IEEE Computer Society, (2017)Non-Intrusive System-Level Fault Tolerance for an Electronic Throttle Controller., , , and . ICN/ICONS/MCL, page 192. IEEE Computer Society, (2006)Agile in India: challenges and lessons learned., and . ISEC, page 125-130. ACM, (2010)A formal model of the Ada Ravenscar tasking profile; delay until., and . SIGAda, page 15-21. ACM, (1999)