From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying factors affecting software development cost and productivity., , , и . Software Quality Journal, 20 (2): 395-417 (2012)Formalizing Analysis of Enterprise Architecture., , и . I-ESA, стр. 35-44. Springer, (2006)The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction., , и . MSVVEIS, стр. 170-179. INSTICC PRESS, (2008)Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD., , , , и . GraMSec@CSF, том 11720 из Lecture Notes in Computer Science, стр. 186-202. Springer, (2019)powerLang: a probabilistic attack simulation language for the power domain., , , , и . Energy Inform., (2020)Assessing Alignment Between Business and IT Strategy: A Case Study., , , , , и . PoEM (Forum), том 2793 из CEUR Workshop Proceedings, стр. 1-12. CEUR-WS.org, (2020)Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes., , и . EDOC Workshops, стр. 112-121. IEEE, (2021)A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO., , , и . KEOD, стр. 253-260. SciTePress, (2017)Search-Based Design of Large Software Systems-of-Systems., , и . SESoS@ICSE, стр. 44-47. IEEE Computer Society, (2015)Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases., , , , и . EDOC, стр. 88-97. IEEE, (2019)