Author of the publication

Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data.

, , , and . IOT, page 151-154. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesized Data Quality Requirements and Roadmap for Improving Reusability of In-Situ Marine Data., , , , , , , and . RE, page 65-76. IEEE, (2023)Identifying security issues in software development: are keywords enough?, , and . ICSE (Companion Volume), page 426-427. ACM, (2018)OAS DB: A Repository of Specifications to Support OpenAPI Research., , , and . SATToSE, volume 2754 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Marine Data Sharing: Challenges, Technology Drivers and Quality Attributes., , , , , , and . PROFES, volume 13709 of Lecture Notes in Computer Science, page 124-140. Springer, (2022)A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams., , and . Int. J. Secur. Softw. Eng., 8 (1): 1-27 (2017)Understanding Challenges to Adoption of the Protection Poker Software Security Game., , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 153-172. Springer, (2018)How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams., , , , and . XP, volume 283 of Lecture Notes in Business Information Processing, page 201-216. (2017)Myths and Facts About Static Application Security Testing Tools: An Action Research at Telenor Digital., , , and . XP, volume 314 of Lecture Notes in Business Information Processing, page 86-103. Springer, (2018)Self-Organizing Map based operating regime estimation for state based control of wastewater treatment plants., , , , and . SoCPaR, page 390-395. IEEE, (2011)Can Refactoring Cyclic Dependent Components Reduce Defect-Proneness?, , and . ICSM, page 420-423. IEEE Computer Society, (2013)