Author of the publication

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.

, , and . REFSQ, volume 6182 of Lecture Notes in Computer Science, page 255-261. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study on the implementation and evaluation of a goal-driven software development risk management model., , and . Inf. Softw. Technol., 56 (2): 117-133 (2014)An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning., , and . AIAI, volume 627 of IFIP Advances in Information and Communication Technology, page 494-504. Springer, (2021)A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures., , and . PCI, page 334-339. ACM, (2021)Towards Cloud Security Monitoring: A Case Study., , and . CCC, page 8-14. IEEE, (2016)Modelling language for cyber security incident handling for critical infrastructures., , , , and . Comput. Secur., (May 2023)Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations., , and . REFSQ, volume 6182 of Lecture Notes in Computer Science, page 255-261. Springer, (2010)Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system., , , , and . Neural Comput. Appl., 34 (1): 493-514 (2022)Attack simulation based software protection assessment method., , , , , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Assets focus risk management framework for critical infrastructure cybersecurity risk management., and . IET Cyper-Phys. Syst.: Theory & Appl., 4 (4): 332-340 (2019)A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem., , , , and . Sensors, 23 (2): 651 (January 2023)