Author of the publication

A Model Driven Method to Design and Analyze Secure Architectures of Systems-of-Systems.

, , , , and . ICECCS, page 166-169. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying empirical software engineering to software architecture: challenges and lessons learned., , , and . Empir. Softw. Eng., 15 (3): 250-276 (2010)Design and evaluation of adaptive system for big data cyber security analytics., , and . Expert Syst. Appl., (2022)Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges., , and . CoRR, (2020)Toward a Reference Architecture for Software Supply Chain Metadata Management., , and . CoRR, (2023)Applying empirical software engineering to software architecture: challenges and lessons learned., , , and . CoRR, (2017)An empirical investigation of the influence of persona with personality traits on conceptual design., , , , , and . J. Syst. Softw., (2017)Identifying relevant studies in software engineering., , and . Inf. Softw. Technol., 53 (6): 625-637 (2011)Identifying high perceived value practices of CMMI level 2: An empirical study., and . Inf. Softw. Technol., 51 (8): 1231-1243 (2009)A Study on Early & Non-Intrusive Security Assessment for Container Images., and . ENASE, page 640-647. SCITEPRESS, (2023)Towards a distributed software architecture evaluation process: a preliminary assessment., , and . ICSE, page 845-848. ACM, (2006)