From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A data-driven, goal-oriented framework for process-focused enterprise re-engineering., , , и . Inf. Syst. E Bus. Manag., 19 (2): 683-747 (2021)A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , и . Visual Privacy Management, том 12030 из Lecture Notes in Computer Science, Springer, (2020)Modeling Design Patterns with Description Logics: A Case Study., , и . CAiSE, том 6741 из Lecture Notes in Computer Science, стр. 169-183. Springer, (2011)Consent verification monitoring., , , и . CoRR, (2022)Analyzing Attack Strategies Through Anti-goal Refinement., , , , и . PoEM, том 235 из Lecture Notes in Business Information Processing, стр. 75-90. Springer, (2015)Security Requirements Engineering for Secure Business Processes., , , и . BIR Workshops, том 106 из Lecture Notes in Business Information Processing, стр. 77-89. Springer, (2011)Security attack analysis using attack patterns., , , , и . RCIS, стр. 1-13. IEEE, (2016)The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report., , и . ER Workshops, том 9382 из Lecture Notes in Computer Science, стр. 347-357. Springer, (2015)Goal-oriented requirements engineering: an extended systematic mapping study., , , , , , , , , и . Requir. Eng., 24 (2): 133-160 (2019)Trust-based specification of sociotechnical systems., , и . Data Knowl. Eng., (2013)