Author of the publication

Towards a Repository of Common Programming Technologies Knowledge

, , , , and . Proc. of the Int'l Workshop on Semantic Technologies in System Maintenance, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Information security management and the human aspect in organizations., and . Inf. Comput. Secur., 25 (5): 494-534 (2017)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , and . ICBC, page 1-5. IEEE, (2022)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 123-136. Elsevier, (2007)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, page 151-161. Vieweg+Teubner Verlag, (2001)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , and . MoDELS, page 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter?, , and . Wirtschaftsinformatik Manag., 10 (3): 74-79 (2018)Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text., , and . Neural Comput. Appl., 35 (24): 17633-17644 (August 2023)