Author of the publication

An Approach for Requirements Elicitation using Goal, Question, and Answer.

, , , and . IIAI-AAI, page 847-852. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Authentication System for Smart Cards., , and . I3E, volume 202 of IFIP Conference Proceedings, page 97-112. Kluwer, (2001)Integrating Mobile IT/Cloud into Enterprise Architecture: a Comparative Analysis., , and . PACIS, page 4. (2016)Mobile Security Assurance for Automotive Software Through ArchiMate., , and . MobiSec, volume 797 of Communications in Computer and Information Science, page 10-20. Springer, (2016)A system theoretic assurance case review., and . ICCSE, page 992-996. IEEE, (2016)Evaluation and introduction of the structured methodology and a CASE tool., , , and . J. Syst. Softw., 28 (1): 49-58 (1995)Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method., , and . IEICE Trans. Inf. Syst., 103-D (6): 1297-1308 (2020)Argument Algebra: A Formalization of Assurance Case Development.. JCKBSE, volume 466 of Communications in Computer and Information Science, page 717-725. Springer, (2014)An Evaluation of Argument Patterns Based on Data Flow.. ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 432-437. Springer, (2014)A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process., and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 457-464. Springer, (2013)Deriving Successful Factors for Practical AI System Development Projects Using Assurance Case., , and . JCKBSE, page 22-32. Springer, (2018)