Author of the publication

Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering.

, and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bypassing Security Toolbars and Phishing Filters via DNS Poisoning., and . GLOBECOM, page 2001-2006. IEEE, (2008)Integrating Privacy Requirements into Security Requirements Engineering., , and . SEKE, page 542-547. Knowledge Systems Institute Graduate School, (2009)Lessons from Stuxnet., and . Computer, 44 (4): 91-93 (2011)Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy., , , and . ARES, page 1044-1051. IEEE Computer Society, (2008)Privacy Risk Assessment in Privacy Requirements Engineering., and . RELAW, page 17-18. IEEE Computer Society, (2009)A comparison of machine learning techniques for phishing detection., , , and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 60-69. ACM, (2007)A distributed architecture for phishing detection using Bayesian Additive Regression Trees., , , and . eCrime, page 1-10. IEEE, (2008)Circumventing security toolbars and phishing filters via rogue wireless access points., and . Wirel. Commun. Mob. Comput., 10 (8): 1128-1139 (2010)Avoiding Denial of Service via Stress Testing., , and . AICCSA, page 300-307. IEEE Computer Society, (2006)Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering., and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)