Author of the publication

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.

, , , , and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 14-21. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Structured Comparison of Social Engineering Intelligence Gathering Tools., , , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 232-246. Springer, (2017)Welcome from the ESPRE 2020 Organisers., , , and . ESPRE@RE, page vi. IEEE, (2020)A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology., , and . HAISA, page 241-251. University of Plymouth, (2016)Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS., , , and . CODASPY, page 119-126. ACM, (2018)Holistic security requirements analysis: An attacker's perspective., , , , and . RE, page 282-283. IEEE Computer Society, (2015)Towards continuous security compliance in agile software development at scale., , , , and . RCoSE@ICSE, page 31-34. ACM, (2018)How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?, , , and . PROFES, volume 12562 of Lecture Notes in Computer Science, page 69-87. Springer, (2020)A Serious Game for Eliciting Social Engineering Security Requirements., and . RE, page 16-25. IEEE Computer Society, (2016)A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain., , and . SAFECOMP, volume 10488 of Lecture Notes in Computer Science, page 305-319. Springer, (2017)Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001.. SOFSEM, volume 8327 of Lecture Notes in Computer Science, page 102-113. Springer, (2014)