Personensuche
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Creating Privacy Policies from Data-Flow Diagrams:
, In:
?
Lecture Notes in Computer Science; Applicable Formal Methods for Safe Industrial Products ,
3
Pattern-Based Risk Identification for Model-Based Risk Mana..:
, In:
?
Human-Centered Software Engineering; Lecture Notes in Computer Science ,
4
Meeting Strangers Online: Feature Models for Trustworthines..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
5
The Relevance of Privacy Concerns, Trust, and Risk for Hybr..:
, In:
?
Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science ,
7
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant P..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
9
ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
11
Risk Treatment: An Iterative Method for Identifying Control:
, In:
?
Communications in Computer and Information Science; Software Technologies ,
12
Model-Based Threat Modeling for Cyber-Physical Systems: A C..:
, In:
?
Communications in Computer and Information Science; Quality of Information and Communications Technology ,
13
Risk Identification Based on Architectural Patterns:
, In:
?
Communications in Computer and Information Science; Software Technologies ,
14
Distributed Frames: Pattern-Based Characterization of Funct..:
, In:
?
Lecture Notes in Computer Science; Risks and Security of Internet and Systems ,
15