Author of the publication

Analyzing Attack Strategies Through Anti-goal Refinement.

, , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 75-90. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data-driven, goal-oriented framework for process-focused enterprise re-engineering., , , and . Inf. Syst. E Bus. Manag., 19 (2): 683-747 (2021)A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report., , and . ER Workshops, volume 9382 of Lecture Notes in Computer Science, page 347-357. Springer, (2015)Security attack analysis using attack patterns., , , , and . RCIS, page 1-13. IEEE, (2016)Goal-oriented requirements engineering: an extended systematic mapping study., , , , , , , , , and . Requir. Eng., 24 (2): 133-160 (2019)Trust-based specification of sociotechnical systems., , and . Data Knowl. Eng., (2013)PACAS: A Gamified Platform for Participatory Change Management in ATM Systems., , , and . REFSQ Workshops, volume 2075 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Consent Verification Under Evolving Privacy Policies., , , and . RE, page 422-427. IEEE, (2019)Modeling Design Patterns with Description Logics: A Case Study., , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)Consent verification monitoring., , , and . CoRR, (2022)