Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification and Validation for Trustworthy Software Systems., , , and . IEEE Software, 28 (6): 86-92 (2011)Integrating Legal and Policy Factors in Cyberpreparedness., , , , and . Computer, 43 (4): 90-92 (2010)Security of runtime extensible virtual environments., , , , and . CVE, page 97-104. ACM, (2002)A New Paradigm for Requirements Specification and Analysis of System-of-Systems., and . RISSEF, volume 2941 of Lecture Notes in Computer Science, page 108-121. Springer, (2002)Independent validation of software safety requirements for systems of systems., , , and . SoSE, page 1-6. IEEE, (2010)Approaches for Measuring Software Project Management Effectiveness., , and . Software Engineering Research and Practice, page 613-619. CSREA Press, (2009)Hazard Analysis and Validation Metrics Framework for System of Systems Software Safety., , , and . IEEE Syst. J., 4 (2): 186-197 (2010)Formal methods in a system-of-systems development., and . SMC, page 1856-1863. IEEE, (2005)Environment behavior models for automation of testing and assessment of system safety., , and . Inf. Softw. Technol., 48 (10): 971-980 (2006)An ontology-based distributed whiteboard to determine legal responses to online cyber attacks., , , and . Internet Res., 16 (5): 475-490 (2006)