From post

Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology.

, , и . Advances in Intelligent Information Systems, том 265 из Studies in Computational Intelligence, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , и . ER, том 2813 из Lecture Notes in Computer Science, стр. 263-276. Springer, (2003)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , и . CoRR, (2000)What the heck is this application doing? - A security-by-contract architecture for pervasive services., , , и . Comput. Secur., 28 (7): 566-577 (2009)Exptime Tableaux for ALC., , и . Description Logics, том WS-96-05 из AAAI Technical Report, стр. 107-110. AAAI Press, (1996)Diversity: A Poor Man's Solution to Drone Takeover., , и . PECCS, стр. 25-34. SciTePress, (2017)An Empirical Methodology to Evaluate Vulnerability Discovery Models., и . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)Maintaining privacy on derived objects., , , и . WPES, стр. 10-19. ACM, (2005)EXPTIME tableaux for ALC., и . Artif. Intell., 124 (1): 87-138 (2000)How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , и . ICAIL, стр. 149-153. ACM, (2007)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , и . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)