Author of the publication

Understanding the Role of Human-Related Factors in Security Requirements Elicitation.

, and . REFSQ, volume 13975 of Lecture Notes in Computer Science, page 65-74. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formulation of the Potential for Communication Condition using C2KA., and . GandALF, volume 161 of EPTCS, page 161-174. (2014)Defense Models for Data Recovery in Industrial Control Systems., and . FPS, volume 13877 of Lecture Notes in Computer Science, page 271-286. Springer, (2022)Verification of Aspectual Composition in Feature-Modeling., , and . SEFM, volume 7504 of Lecture Notes in Computer Science, page 109-125. Springer, (2012)Towards the Certification of Covert Channel Freeness in Cloud-based Systems., and . ANT/SEIT, volume 52 of Procedia Computer Science, page 318-325. Elsevier, (2015)Exploring Covert Channels., and . HICSS, page 1-10. IEEE Computer Society, (2011)An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems., and . IEEE Trans. Reliab., 66 (2): 529-546 (2017)Software Design Trends Supporting Multiconcern Assurance., , and . IEEE Softw., 39 (4): 22-26 (2022)A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets., , , and . ICC, page 2206-2211. IEEE, (2022)Analyzing Structural Security Posture to Evaluate System Design Decisions., , and . QRS, page 8-17. IEEE, (2021)Eliciting a Security Architecture Requirements Baseline from Standards and Regulations., , and . REW, page 224-229. IEEE, (2023)