Author of the publication

Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases.

, and . BMMDS/EMMSAD, volume 113 of Lecture Notes in Business Information Processing, page 378-392. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliciting security requirements with misuse cases, and . Requir. Eng., 10 (1): 34--44 (2005)Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation., , and . BMMDS/EMMSAD, volume 147 of Lecture Notes in Business Information Processing, page 324-338. Springer, (2013)Diagram Notations for Mobile Work Processes., and . PoEM, volume 92 of Lecture Notes in Business Information Processing, page 52-66. Springer, (2011)Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams., and . MoDELS, volume 5301 of Lecture Notes in Computer Science, page 721-735. Springer, (2008)Preface., , , and . CAiSE Forum, volume 247 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?, and . I3E, volume 11701 of Lecture Notes in Computer Science, page 585-596. Springer, (2019)An Analytical Evaluation of BPMN Using a Semiotic Quality Framework., and . EMMSAD, volume 363 of CEUR Workshop Proceedings, page 147-158. CEUR-WS.org, (2005)Breaking the Cyber Kill Chain by Modelling Resource Costs., , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 111-126. Springer, (2020)The Ransomware-as-a-Service economy within the darknet., , and . Comput. Secur., (2020)Pattern-based security requirements specification using ontologies and boilerplates., , and . RePa, page 54-59. IEEE Computer Society, (2012)