Author of the publication

Risk and argument: A risk-based argumentation method for practical security.

, , , , and . RE, page 239-248. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partitioning Loops with Variable Dependence Distances., and . ICPP, page 209-218. IEEE Computer Society, (2000)Assure High Quality Code Using Refactoring and Obfuscation Techniques., , , and . FCST, page 246-252. IEEE Computer Society, (2010)Workshop Proposal for CSMR 2012 - SQM 2012., and . CSMR, page 561-562. IEEE Computer Society, (2012)Performance Visualizations using XML Representations., , and . IV, page 795-800. IEEE Computer Society, (2004)Protecting Privacy in the Cloud: Current Practices, Future Directions., , , , and . IEEE Computer, 49 (2): 68-72 (2016)Towards requirements-driven autonomic systems design., , , and . ACM SIGSOFT Software Engineering Notes, 30 (4): 1-7 (2005)Quality-Based Software Reuse., , , , and . CAiSE, volume 3520 of Lecture Notes in Computer Science, page 535-550. Springer, (2005)Visualizing the Iteration Space in PEFPT., , and . HPCN Europe, volume 1225 of Lecture Notes in Computer Science, page 908-915. Springer, (1997)CrowdService: serving the individuals through mobile crowdsourcing and service composition., , , , , , and . ASE, page 214-219. ACM, (2016)Requirements-driven design of autonomic application software., , , and . CASCON, page 80-94. IBM, (2006)