Author of the publication

A Methodology for Mining Security Tactics from Security Patterns.

, , and . HICSS, page 1-5. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling uncertainty in software engineering using rough sets., and . Innov. Syst. Softw. Eng., 1 (1): 71-78 (2005)The Ten Most Cited Papers From IEEE Transactions on Reliability.. IEEE Trans. Reliab., 73 (1): 12-14 (March 2024)Curriculum Considerations for the Internet of Things., and . Computer, 50 (1): 72-75 (2017)Paying Down Design Debt with Strategic Refactoring., and . Computer, 39 (12): 131-134 (2006)Measuring the complexity of design in real-time imaging software., , and . Real-Time Image Processing, volume 6496 of SPIE Proceedings, page 64960A. SPIE, (2007)Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political., , , , , and . IEEE Technol. Soc. Mag., 30 (1): 28-38 (2011)The Next Generation of Real-Time Operating Systems and Languages.. NATO ASI RTC, volume 127 of NATO ASI Series, page 593-594. Springer, (1992)Disseminating the Best Material to Practitioners., , and . IEEE Software, 34 (3): 111-113 (2017)A Cybersecurity Educated Community., , , and . IEEE Trans. Emerg. Top. Comput., 10 (3): 1456-1463 (2022)Software Testing: The State of the Practice., , and . IEEE Softw., 34 (5): 46-52 (2017)