Author of the publication

WiP: An Architecture for Disruption Management in Smart Manufacturing.

, , , , and . SMARTCOMP, page 279-281. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kavakli, Evangelia
add a person with the name Kavakli, Evangelia
 

Other publications of authors with the same name

Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process., , and . ARES, page 1009-1017. IEEE Computer Society, (2007)The "Panopticon" of search engines: the response of the European data protection framework., , , and . Requir. Eng., 16 (1): 47-54 (2011)Addressing privacy requirements in system design: the PriS method., , and . Requir. Eng., 13 (3): 241-255 (2008)Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering., , and . MCIS, page 71. Athens University of Economics and Business / AISeL, (2009)Capability Oriented Enterprise Knowledge Modeling: The CODEK Approach., and . Domain-Specific Conceptual Modeling, Springer, (2016)WiP: An Architecture for Disruption Management in Smart Manufacturing., , , , and . SMARTCOMP, page 279-281. IEEE Computer Society, (2018)Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks., , and . EGOV, volume 3183 of Lecture Notes in Computer Science, page 66-71. Springer, (2004)Enterprise Modelling and the Teleological Approach to Requirements Engineering., and . Int. J. Cooperative Inf. Syst., 4 (1): 45-79 (1995)A Rule-Based Approach Founded on Description Logics for Industry 4.0 Smart Factories., , and . IEEE Trans. Industrial Informatics, 15 (9): 4888-4899 (2019)Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts., , , , , and . Computer Standards & Interfaces, 36 (4): 759-775 (2014)