Author of the publication

Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang.

, and . CyberSA, page 1-7. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction., , and . MSVVEIS, page 170-179. INSTICC PRESS, (2008)Formalizing Analysis of Enterprise Architecture., , and . I-ESA, page 35-44. Springer, (2006)A Tool for Enterprise Architecture Analysis of Maintainability., , , , , , and . CSMR, page 327-328. IEEE Computer Society, (2009)Visualizing and Measuring Enterprise Application Architecture: An Exploratory Telecom Case., , , and . HICSS, page 3847-3856. IEEE Computer Society, (2014)Enterprise Architecture Management's Impact on Information Technology Success., , , and . HICSS, page 1-10. IEEE Computer Society, (2011)Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL)., , , and . SESoS@ICSE, page 1-7. ACM, (2016)Identifying factors affecting software development cost and productivity., , , and . Software Quality Journal, 20 (2): 395-417 (2012)Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD., , , , and . GraMSec@CSF, volume 11720 of Lecture Notes in Computer Science, page 186-202. Springer, (2019)Enterprise Architecture and Agile Development: Friends or Foes?, , , , , and . EDOC Workshops, page 176-183. IEEE Computer Society, (2018)A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources., , , and . EDOC Workshops, page 79-87. IEEE Computer Society, (2015)