Author of the publication

Integrating Privacy Requirements into Security Requirements Engineering.

, , and . SEKE, page 542-547. Knowledge Systems Institute Graduate School, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast and Accurate Feature Selection Algorithm Based on Binary Consistency Measure., and . Comput. Intell., 32 (4): 646-667 (2016)Consistency Measures for Feature Selection: A Formal Definition, Relative Sensitivity Comparison, and a Fast Algorithm., , and . IJCAI, page 1491-1497. IJCAI/AAAI, (2011)An intelligent movie production system., , , and . IADIS AC, page 241-246. IADIS, (2005)E-Movie Creation by Rule-Based Reasoning from the Director's Viewpoint - E-Movie: Computer Animation & Real Images., , , and . EWIMT, QMUL, (2004)Creating mobile animation messages without authoring., , , , and . CCNC, page 248-252. IEEE, (2006)Integrating privacy requirements considerations into a security requirements engineering method and tool., , and . IJIPSI, 1 (1): 106-126 (2011)Spirit: Security and Privacy in Real-Time Monitoring System., , and . J. Convergence Inf. Technol., 5 (10): 22-28 (2010)Computer-Aided Privacy Requirements Elicitation Technique., , and . APSCC, page 367-372. IEEE Computer Society, (2008)Personal e-moviemaker design., , , and . IASTED Conf. on Software Engineering and Applications, page 755-760. IASTED/ACTA Press, (2004)H∞ control of microgrids involving gas turbine engines and batteries., , , , and . CDC, page 4241-4246. IEEE, (2012)