From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method for predicting the probability of business network profitability., , , , , и . Inf. Syst. E Bus. Manag., 12 (4): 567-593 (2014)A Meta Language for Threat Modeling and Attack Simulations., , и . ARES, стр. 38:1-38:8. ACM, (2018)An Enterprise Architecture framework for application consolidation in the Swedish Armed Forces., и . EDOCW, стр. 264-273. IEEE Computer Society, (2009)A Bayesian network for IT governance performance prediction., , и . ICEC, том 342 из ACM International Conference Proceeding Series, стр. 1:1-1:8. ACM, (2008)Report on the IFIP WG5.8 international workshop on enterprise interoperability (IWEI 2008)., , и . SIGMOD Record, 37 (4): 112-114 (2008)The IT Organization Modeling and Assessment Tool for IT Governance Decision Support., , и . CAiSE, том 5074 из Lecture Notes in Computer Science, стр. 258-261. Springer, (2008)The Tarpit - A general theory of software engineering., и . Inf. Softw. Technol., (2016)Time between vulnerability disclosures: A measure of software product vulnerability., , , и . Comput. Secur., (2016)Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis., , , и . IEEE Trans. Dependable Secur. Comput., 15 (6): 1002-1015 (2018)Assessment of business process information security., и . Int. J. Bus. Process. Integr. Manag., 3 (2): 118-130 (2008)