Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Usability Evaluation of the NESSoS Common Body of Knowledge., and . ARES, page 559-568. IEEE Computer Society, (2013)Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022)., , , and . Dagstuhl Reports, 3 (1): 30-46 (2013)A Method to Derive Software Architectures from Quality Requirements., , and . APSEC, page 322-330. IEEE Computer Society, (2011)Korrekte Software: Nur eine Illusion?, and . GI Jahrestagung, page 240. Springer, (1993)Korrekte Software: Nur eine Illusion?, and . Inform., Forsch. Entwickl., 9 (4): 192-200 (1994)Formale Programmentwicklung mit dynamischer Logik.. Karlsruhe Institute of Technology, Germany, (1992)Systematic Development of UMLsec Design Models Based on Security Requirements., , , and . FASE, volume 6603 of Lecture Notes in Computer Science, page 232-246. Springer, (2011)Problem-Oriented Documentation of Design Patterns., , and . FASE, volume 5503 of Lecture Notes in Computer Science, page 294-308. Springer, (2009)Towards an ILP Approach for Learning Privacy Heuristics from Users' Regrets., , and . ENIC, page 187-197. Springer, (2017)Pattern-Based Evolution of Software Architectures., , and . ECSA, volume 4758 of Lecture Notes in Computer Science, page 29-43. Springer, (2007)