Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Landscape of Architecture and Design Patterns for IoT Systems., , , , , and . IEEE Internet Things J., 7 (10): 10091-10101 (2020)Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Misuse Cases + Assets + Security Goals., , and . CSE (3), page 424-429. IEEE Computer Society, (2009)A Tool to Manage Traceability on Several Models and Its Use Case., , , , , , and . KES, volume 176 of Procedia Computer Science, page 1449-1458. Elsevier, (2020)A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base., , , , , , and . RE Workshops, page 134-140. IEEE, (2019)Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling., , , , , , , and . JCKBSE, volume 19 of Learning and Analytics in Intelligent Systems, page 70-83. Springer, (2020)Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache., , , , , and . IEEE Access, (2019)The design of secure IoT applications using patterns: State of the art and directions for research., , , and . Internet Things, (2021)CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development., , , , , , , , , and 1 other author(s). Int. J. Syst. Softw. Secur. Prot., 12 (2): 68-85 (2021)An Assurance Case Approach for Software Code Security., , , and . WESPr-iMLSE@APSEC, volume 2809 of CEUR Workshop Proceedings, page 10-17. CEUR-WS.org, (2018)