Author of the publication

DIGS: A Framework for Discovering Goals for Security Requirements Engineering.

, , , , and . ESEM, page 35:1-35:10. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)DIAMOnDS - DIstributed Agents for MObile & Dynamic Services, , , , , , , and . CoRR, (2003)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1096-1105. Springer, (2005)Quality-aware trajectory planning of cellular connected UAVs., , , , , , and . DroneCom@MOBICOM, page 79-85. ACM, (2020)TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , and . Sci. Program., (2021)A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems., , , , and . RTCSA, page 451-454. IEEE Computer Society, (2005)Service Delivery in Context Aware Environments: Lookup and Access Control Issues., , , , and . RTCSA, page 455-458. IEEE Computer Society, (2005)Hidden in plain sight: Automatically identifying security requirements from natural language artifacts., , , and . RE, page 183-192. IEEE Computer Society, (2014)