Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended Influence Diagrams for System Quality Analysis., , , and . JSW, 2 (3): 30-42 (2007)Probabilistic Metamodel Merging., , , and . CAiSE Forum, volume 344 of CEUR Workshop Proceedings, page 25-28. CEUR-WS.org, (2008)Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)Extended Influence Diagrams for Enterprise Architecture Analysis., , , and . EDOC, page 3-12. IEEE Computer Society, (2006)Mapping the Substation Configuration Language of IEC 61850 to ArchiMate., , , , and . EDOCW, page 60-68. IEEE Computer Society, (2010)Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case., , , and . PoEM, volume 165 of Lecture Notes in Business Information Processing, page 9-23. Springer, (2013)Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach., , and . EDOC Workshops, page 1-8. IEEE Computer Society, (2016)Analyzing the Effectiveness of Attack Countermeasures in a SCADA System., , , , , and . SPSR-SG@CPSWeek, page 73-78. ACM, (2017)Trends in Enterprise Architecture Practice - A Survey., , , , and . TEAR, volume 70 of Lecture Notes in Business Information Processing, page 16-29. Springer, (2010)A Framework for Assessing Business Value of Service Oriented Architectures., and . IEEE SCC, page 670-671. IEEE Computer Society, (2007)