Author of the publication

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.

, , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)DIAMOnDS - DIstributed Agents for MObile & Dynamic Services, , , , , , , and . CoRR, (2003)Grid Access Middleware for Handheld Devices., , , , and . EGC, volume 3470 of Lecture Notes in Computer Science, page 1002-1011. Springer, (2005)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , and . ICCCN, page 1-11. IEEE, (2020)Towards a framework to measure security expertise in requirements analysis., , , and . ESPRE, page 13-18. IEEE Computer Society, (2014)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1096-1105. Springer, (2005)Quality-aware trajectory planning of cellular connected UAVs., , , , , , and . DroneCom@MOBICOM, page 79-85. ACM, (2020)TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , and . Sci. Program., (2021)