Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Usability Evaluation of the NESSoS Common Body of Knowledge., and . ARES, page 559-568. IEEE Computer Society, (2013)Single-message denial-of-service attacks against voice-over-internet protocol terminals., , and . IJESDF, 2 (1): 29-34 (2009)Supporting Common Criteria Security Analysis with Problem Frames., , and . JoWUA, 5 (1): 37-63 (2014)ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System., , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface., , , , and . SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 90-108. Springer, (2015)Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing., , , and . ARES, page 327-333. IEEE Computer Society, (2011)Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation., , , and . ARES, page 242-248. IEEE Computer Society, (2012)Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment., , , and . REFSQ Workshops, volume 1796 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study., , , and . PROFES, volume 10611 of Lecture Notes in Computer Science, page 199-218. Springer, (2017)Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001.. SOFSEM, volume 8327 of Lecture Notes in Computer Science, page 102-113. Springer, (2014)