Author of the publication

Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach.

, , , , and . BMMDS/EMMSAD, volume 29 of Lecture Notes in Business Information Processing, page 381-393. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD., , , , and . GraMSec@CSF, volume 11720 of Lecture Notes in Computer Science, page 186-202. Springer, (2019)The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction., , and . MSVVEIS, page 170-179. INSTICC PRESS, (2008)Formalizing Analysis of Enterprise Architecture., , and . I-ESA, page 35-44. Springer, (2006)Identifying factors affecting software development cost and productivity., , , and . Software Quality Journal, 20 (2): 395-417 (2012)powerLang: a probabilistic attack simulation language for the power domain., , , , and . Energy Inform., (2020)Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes., , and . EDOC Workshops, page 112-121. IEEE, (2021)Assessing Alignment Between Business and IT Strategy: A Case Study., , , , , and . PoEM (Forum), volume 2793 of CEUR Workshop Proceedings, page 1-12. CEUR-WS.org, (2020)Search-Based Design of Large Software Systems-of-Systems., , and . SESoS@ICSE, page 44-47. IEEE Computer Society, (2015)A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO., , , and . KEOD, page 253-260. SciTePress, (2017)Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases., , , , and . EDOC, page 88-97. IEEE, (2019)