Author of the publication

Business Model Risk Analysis: Predicting the Probability of Business Network Profitability.

, , , , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 118-130. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources., , , and . EDOC Workshops, page 79-87. IEEE Computer Society, (2015)Automating threat modeling using an ontology framework., , , and . Cybersecur., 3 (1): 19 (2020)A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery., , , and . Complex Syst. Informatics Model. Q., (2019)A method for predicting the probability of business network profitability., , , , , and . Inf. Syst. E Bus. Manag., 12 (4): 567-593 (2014)Load balancing of renewable energy: a cyber security analysis., , , , , and . Energy Inform., (2018)Modeling and Prediction of Monetary and Non-monetary Business Values., , , , and . EDOC, page 153-158. IEEE Computer Society, (2013)Business Model Risk Analysis: Predicting the Probability of Business Network Profitability., , , , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 118-130. Springer, (2013)A Study on Software Vulnerabilities and Weaknesses of Embedded Systems in Power Networks., , and . SPSR-SG@CPSWeek, page 47-52. ACM, (2017)Enterprise Architecture Evaluation Using Utility Theory., , , , and . EDOC Workshops, page 347-351. IEEE Computer Society, (2013)Integrated Metamodel for Security Analysis., , , and . HICSS, page 5192-5200. IEEE Computer Society, (2015)