Author of the publication

Holistic security requirements analysis: An attacker's perspective.

, , , , and . RE, page 282-283. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Modeling for Business Agility., , , and . Business & Information Systems Engineering, 60 (1): 1-2 (2018)Strategic business modeling: representation and reasoning., , , , , , and . Softw. Syst. Model., 13 (3): 1015-1041 (2014)Requirements engineering challenges and practices in large-scale agile system development., , , , and . J. Syst. Softw., (2021)Evaluating Modeling Languages: An Example from the Requirements Domain., , , , and . ER, volume 8824 of Lecture Notes in Computer Science, page 260-274. Springer, (2014)Finding Solutions in Goal Models: An Interactive Backward Reasoning Approach., and . ER, volume 6412 of Lecture Notes in Computer Science, page 59-75. Springer, (2010)Uncertainty in Goal and Law Modeling and Analysis., , and . iStar, volume 978 of CEUR Workshop Proceedings, page 31-36. CEUR-WS.org, (2013)From RE Cares to SE Cares: software engineering for social good, one venue at a time., , , , , , , , , and 5 other author(s). ICSE-SEIS, page 49-52. ACM, (2020)Understanding Challenges and Tradeoffs in iStar Tool Development., , and . iStar, volume 1674 of CEUR Workshop Proceedings, page 49-54. CEUR-WS.org, (2016)Requirements Engineering for Software-Enabled Art: Challenges and Guidelines., and . REFSQ, volume 13216 of Lecture Notes in Computer Science, page 219-234. Springer, (2022)Requirements Engineering for Automotive Perception Systems: An Interview Study., , , , , , , , and . REFSQ, volume 13975 of Lecture Notes in Computer Science, page 189-205. Springer, (2023)