Author of the publication

Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.

, , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances in the provisions of system and software security - Thirty years of progress.. Advances in Computers, (2003)A Cognitive Model for Alert Correlation in a Distributed Environment., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 218-230. Springer, (2005)Using Search Engines to Acquire Network Forensic Evidence., and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 247-253. Springer, (2007)Time Analysis of Hard Drive Imaging Tools., , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 335-344. Springer, (2008)Introduction to the Cybersecurity Minitrack., , and . HICSS, page 2615. IEEE Computer Society, (2016)Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks., and . HICSS, page 270. IEEE Computer Society, (2007)Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering., and . HICSS, IEEE Computer Society, (2006)Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams., , and . J. Digital Forensic Practice, 1 (3): 193-199 (2006)Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models., , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 506-514. Springer, (2005)Lightweight monitoring of MPI programs in real time., , , , and . Concurr. Comput. Pract. Exp., 17 (13): 1547-1578 (2005)