Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliciting security requirements with misuse cases, and . Requir. Eng., 10 (1): 34--44 (2005)A Framework for Performance Engineering During Information System Development., and . CAiSE, volume 593 of Lecture Notes in Computer Science, page 65-87. Springer, (1992)Erratum to Öntological analysis of whole-part relationships in OO-models"., , and . Inf. Softw. Technol., 43 (9): 577 (2001)Comparing attack trees and misuse cases in an industrial setting., , , and . Inf. Softw. Technol., 56 (3): 294-308 (2014)Ontological analysis of whole-part relationships in OO-models., , and . Inf. Softw. Technol., 43 (6): 387-399 (2001)Aligning the UEML Ontology with SUMO.. I-ESA, page 409-418. Springer, (2010)Semantic Knowledge Graphs for the News: A Review., , , , , and . ACM Comput. Surv., 55 (7): 140:1-140:38 (2023)Named Entity Extraction for Knowledge Graphs: A Literature Overview., , , and . IEEE Access, (2020)Special issue on conceptual modeling - 34th International Conference on Conceptual Modeling (ER 2015)., , , , and . Data Knowl. Eng., (2017)Data Privacy in Journalistic Knowledge Platforms., , and . CIKM (Workshops), volume 2699 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)