Author of the publication

A Case-based Management System for Secure Software Development Using Software Security Knowledge.

, , , , , , and . KES, volume 60 of Procedia Computer Science, page 1092-1100. Elsevier, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliciting Requirements for Improving Users' Behavior Using Transparency., , , , , , and . APRES, volume 809 of Communications in Computer and Information Science, page 41-56. Springer, (2017)Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT., , , , , and . ICNCC, page 157-164. ACM, (2018)Power of Communication Behind Extreme Cybersecurity Incidents., and . DASC/PiCom/DataCom/CyberSciTech, page 315-319. IEEE, (2019)Analysis of IoT Pattern Descriptions., , , , , and . SERP4IoT, page 21-26. IEEE, (2021)Tracing CAPEC Attack Patterns from CVE Vulnerability Information using Natural Language Processing Technique., , , , , , , , and . HICSS, page 1-9. ScholarSpace, (2021)Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model., , and . COMPSAC Workshops, page 367-372. IEEE Computer Society, (2012)Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services., , , , , , , , , and 2 other author(s). MODELSWARD, page 379-386. SciTePress, (2018)Cooperative Secure Integration Process for Secure System Development., , , and . NBiS, page 782-786. IEEE Computer Society, (2012)Landscape of IoT patterns., , , , , , , and . SERP4IoT@ICSE, page 57-60. IEEE / ACM, (2019)Validating Security Design Patterns Application Using Model Testing., , , , , and . ARES, page 62-71. IEEE Computer Society, (2013)