Author of the publication

Holistic security requirements analysis for socio-technical systems.

, , and . Softw. Syst. Model., 17 (4): 1253-1285 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust estimation of generalized linear models with measurement errors, and . Journal of Econometrics, 118 (1-2): 51--65 (00 2004)Conditionally independent private information in OCS wildcat auctions, , and . Journal of Econometrics, 98 (1): 129--161 (September 2000)Time delay estimation of HF fading signal in impulsive noise environments., , and . WOCC, page 204-208. IEEE, (2013)面向对象的可信构件网的组装研究 (Study of Component Assembling Technologies under Object-oriented Trusted Component Model)., , , , , and . 计算机科学, 44 (11): 104-108 (2017)Edge Intelligence: Empowering Intelligence to the Edge of Network., , , , , , , and . Proc. IEEE, 109 (11): 1778-1837 (2021)Intelligent Proactive Maintenance System for High-Speed Railway Traction Power Supply System., , , and . IEEE Trans. Ind. Informatics, 16 (11): 6729-6739 (2020)Data security against receiver corruptions: SOA security for receivers from simulatable DEMs., , , , and . Inf. Sci., (2019)AI and Blockchain Empowered Metaverse for Web 3.0: Vision, Architecture, and Future Directions., , , , , and . IEEE Commun. Mag., 61 (8): 60-66 (August 2023)Empty nodes affect conditional cooperation under reinforcement learning., , , , and . Appl. Math. Comput., (2022)Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks., , , , and . IEEE J. Sel. Areas Commun., 38 (6): 1040-1057 (2020)