Author of the publication

Security Engineering Approach to Support Software Security.

, , and . SERVICES, page 48-55. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multiple Criteria Approach to Analysis and Resolution of the Causes of Problems on Software Organizations., , , and . SCSS (1), page 285-290. Springer, (2008)A Comprehensive Study on Knowledge Management Applied to Embedded System Testing Processes., , and . CSE/EUC, page 410-418. IEEE, (2019)An Agile Approach to Improve Process-Oriented Software Development., , and . CSOC (2), volume 465 of Advances in Intelligent Systems and Computing, page 413-424. Springer, (2016)Task assignment to distributed teams aided by a hybrid methodology of verbal decision analysis., , and . IET Softw., 11 (5): 245-255 (2017)Uma Abordagem de Gestão e Desenvolvimento de Automatização de Processos de Negócios com apoio de BPMS., and . SBQS, page 137-151. SBC, (2015)Requirements Prioritization in Market-Driven Software: A Survey Based on Large Numbers of Stakeholders and Requirements., , and . QUATIC, page 67-72. IEEE Computer Society, (2016)Improving Business by Migrating Applications to the Cloud Using Cloudstep., , , , , and . AINA Workshops, page 77-82. IEEE Computer Society, (2015)Virtual Bookstores Quality Evaluation: A Case Study., and . WSE, page 73-. IEEE Computer Society, (2002)Constructing Measurement Repositories in Software Organizations: a real experience., , , and . CIbSE, page 211-224. (2009)Towards the Selection of Testable Use Cases and a Real Experience., , , , and . WSKS (2), volume 49 of Communications in Computer and Information Science, page 513-521. Springer, (2009)