Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Tarpit - A general theory of software engineering., and . Information & Software Technology, (2016)A method for creating entreprise architecture metamodels applied to systems modifiability., , , and . IJCSA, 6 (5): 89-120 (2009)Time between vulnerability disclosures: A measure of software product vulnerability., , , and . Computers & Security, (2016)A Meta Language for Threat Modeling and Attack Simulations., , and . ARES, page 38:1-38:8. ACM, (2018)A Meta-language for Enterprise Architecture Analysis., , , , and . BMMDS/EMMSAD, volume 81 of Lecture Notes in Business Information Processing, page 511-525. Springer, (2011)The IT Organization Modeling and Assessment Tool for IT Governance Decision Support., , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 258-261. Springer, (2008)A Bayesian network for IT governance performance prediction., , and . ICEC, volume 342 of ACM International Conference Proceeding Series, page 1:1-1:8. ACM, (2008)Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs., , , , and . RISK, volume 10224 of Lecture Notes in Computer Science, page 37-52. (2016)A Method for Constructing a Company Specific Enterprise Architecture Model Framework., , and . SNPD, page 346-351. IEEE Computer Society, (2009)A method for predicting the probability of business network profitability., , , , , and . Inf. Syst. E-Business Management, 12 (4): 567-593 (2014)