From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Patterns and A Methodology to Apply them.. Security and Dependability for Ambient Intelligence, том 45 из Advances in Information Security, Springer, (2009)Defining Security Requirements Through Misuse Actions., , , и . IFIP Workshop on Advanced Software Engineering, том 219 из IFIP, стр. 123-137. Springer, (2006)Embedding of Binomial Treas in Hypercubes with Link Faults., , и . J. Parallel Distributed Comput., 54 (1): 49-74 (1998)A uniform approach to software and hardware fault tolerance., , и . J. Syst. Softw., 26 (2): 117-127 (1994)The Account Analysis Pattern., и . EuroPLoP, стр. 477-484. UVK - Universitaetsverlag Konstanz, (2002)An Analysis Pattern for Course Management., и . EuroPLoP, стр. 899-912. UVK - Universitaetsverlag Konstanz, (2003)A pattern system of underlying theories for process improvement., и . PLoP, стр. 8:1-8:24. ACM, (2010)The design of secure IoT applications using patterns: State of the art and directions for research., , , и . Internet Things, (2021)Scheduling as a Graph Transformation., и . IBM J. Res. Dev., 20 (6): 551-559 (1976)Using Security Patterns to Develop Secure Systems - Ten Years Later., , и . Int. J. Syst. Softw. Secur. Prot., 9 (4): 46-57 (2018)