Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COMPASS: Composition-Centric Mapping of Aspectual Requirements to Architecture, , , and . (2007)Discovering Early Aspects, , , , , and . IEEE Software, 23 (1): 61--70 (January 2006)Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design., and . SEsCPS@ICSE, page 22-25. IEEE, (2017)Modularisation and composition of aspectual requirements., , and . AOSD, page 11-20. ACM, (2003)SADES - a Semi-Autonomous Database Evolution System.. ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 24-25. Springer, (1998)Early Aspects: Are There Any Other Kind?. EA@AOSD, volume 4765 of Lecture Notes in Computer Science, page 195-198. Springer, (2007)Understanding security requirements for industrial control system supply chains., , and . SEsCPS@ICSE, page 50-53. IEEE / ACM, (2019)Automating the mutation testing of aspect-oriented Java programs., , , and . AST, page 51-58. ACM, (2010)On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study., , , and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 243-257. Springer, (2008)CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy., and . ACM Conference on Computer and Communications Security, page 2171-2172. ACM, (2018)