Author of the publication

Automated analysis of security requirements through risk-based argumentation.

, , , , and . Journal of Systems and Software, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What you ask is what you get: Understanding architecturally significant functional requirements., , , , and . RE, page 86-95. IEEE Computer Society, (2015)Requirements Engineering: Problem Analysis and Solution Specification (Extended Abstract).. ICWE, volume 3140 of Lecture Notes in Computer Science, page 13-16. Springer, (2004)Some Finite-Graph Models for Process Algebra., and . CONCUR, volume 527 of Lecture Notes in Computer Science, page 495-509. Springer, (1991)Probing for requirements knowledge to stimulate architectural thinking., , , , , , and . ICSE, page 843-854. ACM, (2016)An Empirical Study to Validate the Use of Ontological Guidelines in the Creation of i* Models., , , , and . ONTOBRAS, volume 1442 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)A Real-Time Execution Semantics for UML Activity Diagrams., and . FASE, volume 2029 of Lecture Notes in Computer Science, page 76-90. Springer, (2001)CRAC: Confidentiality risk assessment and IT-infrastructure comparison., , , and . CNSM, page 322-325. IEEE, (2010)Security Implications of Virtualization: A Literature Study., , and . CSE (3), page 353-358. IEEE Computer Society, (2009)Validating the Raster Risk Assessment Method in Practice., , and . ISCRAM, ISCRAM Association, (2015)Towards middle-range usable design theories for software engineering.. GTSE, page 1-4. ACM, (2014)