Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge-Driven Data Ecosystems Toward Data Transparency, , , , , , , , , and 2 other author(s). Journal of Data and Information Quality, 14 (1): 1--12 (March 2022)Knowledge-driven Data Ecosystems Towards Data Transparency., , , , , , , , , and 2 other author(s). CoRR, (2021)STS: a Security Requirements Engineering methodology for socio-technical Systems.. University of Trento, Italy, (2014)Towards a Basic Security Framework for SMEs - Results From an Investigation of Cybersecurity Challenges in Denmark., , , and . REW, page 230-233. IEEE, (2023)Can Goal Reasoning Techniques Be Used for Strategic Decision-Making?, , , and . ER, volume 9974 of Lecture Notes in Computer Science, page 530-543. (2016)A Holistic Approach to Attack Modeling and Analysis., , , , and . iStar, volume 1402 of CEUR Workshop Proceedings, page 49-54. CEUR-WS.org, (2015)Information Security Risk Management., , and . PoEM, volume 305 of Lecture Notes in Business Information Processing, page 18-33. Springer, (2017)Modeling Design Patterns with Description Logics: A Case Study., , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)Analyzing Attack Strategies Through Anti-goal Refinement., , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 75-90. Springer, (2015)Security Requirements Engineering for Secure Business Processes., , , and . BIR Workshops, volume 106 of Lecture Notes in Business Information Processing, page 77-89. Springer, (2011)