Author of the publication

Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions.

, , , , and . HICSS, page 1-9. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying factors affecting software development cost and productivity., , , and . Software Quality Journal, 20 (2): 395-417 (2012)Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD., , , , and . GraMSec@CSF, volume 11720 of Lecture Notes in Computer Science, page 186-202. Springer, (2019)Formalizing Analysis of Enterprise Architecture., , and . I-ESA, page 35-44. Springer, (2006)The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction., , and . MSVVEIS, page 170-179. INSTICC PRESS, (2008)Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases., , , , and . EDOC, page 88-97. IEEE, (2019)powerLang: a probabilistic attack simulation language for the power domain., , , , and . Energy Inform., (2020)Assessing Alignment Between Business and IT Strategy: A Case Study., , , , , and . PoEM (Forum), volume 2793 of CEUR Workshop Proceedings, page 1-12. CEUR-WS.org, (2020)Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes., , and . EDOC Workshops, page 112-121. IEEE, (2021)A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO., , , and . KEOD, page 253-260. SciTePress, (2017)Search-Based Design of Large Software Systems-of-Systems., , and . SESoS@ICSE, page 44-47. IEEE Computer Society, (2015)