Author of the publication

A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN.

, , , and . Guide to Vulnerability Analysis for Computer Networks and Systems, Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Transductive Support Vector Machine with adjustable quasi-linear kernel for semi-supervised data classification., , , and . IJCNN, page 1409-1415. IEEE, (2014)Finding Cloesed Frequent Itemsets in Linear Time., , , and . DMIN, page 291-297. CSREA Press, (2008)Delay Optimization in Cooperative Relaying with Cyclic Delay Diversity., , , , and . ICC, page 3553-3557. IEEE, (2008)BPMN Security Extensions for Healthcare Process., and . CIT/IUCC/DASC/PICom, page 2340-2345. IEEE, (2015)Protecting Future Personal Computing: Challenging Traditional Network Security Models., , and . CIT/IUCC/DASC/PICom, page 1772-1779. IEEE, (2015)Event Driven Monitoring of Composite Services., , , , , and . SocialCom, page 550-557. IEEE Computer Society, (2013)A Framework for Secure Service Composition., , , , and . SocialCom, page 647-652. IEEE Computer Society, (2013)A Tableau Algorithm for EFSHOIN Ontologies., , , and . FSKD (5), page 141-145. IEEE Computer Society, (2008)978-0-7695-3305-6.Daming Palace Archaeological Site Park Construction Scheme based on Construction., and . Journal of Multimedia, 8 (5): 565-572 (2013)Balancing intrusion detection resources in ubiquitous computing networks., , and . Computer Communications, 31 (15): 3643-3653 (2008)