Author of the publication

Applying Tropos to Socio-Technical System Design and Runtime Configuration.

, , , , and . WOA, page 101-107. Seneca Edizioni Torino, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Asnar, Yudistira
add a person with the name Asnar, Yudistira
 

Other publications of authors with the same name

Applying Tropos to Socio-Technical System Design and Runtime Configuration., , , , and . WOA, page 101-107. Seneca Edizioni Torino, (2008)Development of Machine Learning Subsystem in Intrusion Detection System for Cyber Physical System., and . ICEEI, page 1-6. IEEE, (2023)Perceived risk assessment., and . QoP, page 59-64. ACM, (2008)Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain., and . ARES, page 148-155. IEEE Computer Society, (2010)Computer Aided Threat Identification., , , and . CEC, page 145-152. IEEE Computer Society, (2011)From Trust to Dependability through Risk Analysis., , , and . ARES, page 19-26. IEEE Computer Society, (2007)Intrusion Detection System Architecture for Cyber-Physical System., and . ICEEI, page 1-6. IEEE, (2023)Analyzing Business Continuity through a Multi-layers Model., and . BPM, volume 5240 of Lecture Notes in Computer Science, page 212-227. Springer, (2008)Modelling Risk and Identifying Countermeasure in Organizations., and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 55-66. Springer, (2006)A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach., and . FOSAD, volume 6858 of Lecture Notes in Computer Science, page 152-184. Springer, (2011)