Author of the publication

The Waterfall Model in Large-Scale Development.

, , and . PROFES, volume 32 of Lecture Notes in Business Information Processing, page 386-400. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the cost reduction of static code analysis for software security., , and . PLAS, page 79-88. ACM, (2008)Action research as a model for industry-academia collaboration in the software engineering context., , , , and . WISE@ASE, page 55-62. ACM, (2014)Analysis of fraud controls using the PaySim financial simulator., , and . IJSPM, 13 (4): 377-386 (2018)Countermeasure graphs for software security risk assessment: An action research., and . J. Syst. Softw., 86 (9): 2411-2428 (2013)Agile development with security engineering activities., and . ICSSP, page 149-158. ACM, (2011)Developing Secure Software: in an Agile Process.. Blekinge Institute of Technology, Sweden, (2012)Prioritizing Countermeasures through the Countermeasure Method for Software Security (CM-Sec)., and . PROFES, volume 6156 of Lecture Notes in Business Information Processing, page 176-190. Springer, (2010)The Waterfall Model in Large-Scale Development., , and . PROFES, volume 32 of Lecture Notes in Business Information Processing, page 386-400. Springer, (2009)Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?, , , and . ARES, page 804-810. IEEE Computer Society, (2009)Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting.. ARES, page 386-390. IEEE Computer Society, (2010)