Author of the publication

A Look at Misuse Cases for Safety Concerns.

. Situational Method Engineering, volume 244 of IFIP, page 252-266. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Information Security Model by using TFI., , and . SEC, volume 232 of IFIP, page 73-84. Springer, (2007)Towards a Deeper Understanding of Quality in Requirements Engineering, , and . CAiSE, volume 932 of Lecture Notes in Computer Science, page 82-95. Springer, (1995)A Netnographic Study on the Dark Net Ecosystem for Ransomware., , and . CyberSA, page 1-8. IEEE, (2018)Eliciting security requirements with misuse cases, and . Requir. Eng., 10 (1): 34--44 (2005)Diagram Notations for Mobile Work Processes., and . PoEM, volume 92 of Lecture Notes in Business Information Processing, page 52-66. Springer, (2011)Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation., , and . BMMDS/EMMSAD, volume 147 of Lecture Notes in Business Information Processing, page 324-338. Springer, (2013)Argumentative agents to handle the conflicts between web services: a prototype., and . MEDES, page 442-445. ACM, (2009)The Ransomware-as-a-Service economy within the darknet., , and . Comput. Secur., (2020)An Analytical Evaluation of BPMN Using a Semiotic Quality Framework., and . EMMSAD, volume 363 of CEUR Workshop Proceedings, page 147-158. CEUR-WS.org, (2005)E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?, and . I3E, volume 11701 of Lecture Notes in Computer Science, page 585-596. Springer, (2019)