Author of the publication

Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.

, , , and . SECRYPT, page 391-398. INSTICC Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do Rules and Patterns Affect Design Maintainability?, , and . J. Comput. Sci. Technol., 24 (2): 262-272 (2009)A method for transforming knowledge discovery metamodel to ArchiMate models., , , , and . Softw. Syst. Model., 21 (1): 311-336 (2022)Understanding the Impact of Development Efforts in Code Quality., and . J. Univers. Comput. Sci., 27 (10): 1096-1127 (2021)Software modernization by recovering Web services from legacy databases., , , and . J. Softw. Evol. Process., 25 (5): 507-533 (2013)Applying the "STUDIO" method to the interface design of an environmental software system., and . ACM SIGSOFT Softw. Eng. Notes, 22 (4): 81-83 (1997)Application of ISO/IEC TR 33014 to the improvement of Green IT processes., , , , , , and . Comput. Stand. Interfaces, (2022)MAMD 2.0: Environment for data quality processes implantation based on ISO 8000-6X and ISO/IEC 33000., , , and . Comput. Stand. Interfaces, (2017)A systematic mapping study on enterprise architecture mining., , , and . Enterp. Inf. Syst., 13 (5): 675-718 (2019)What Makes Agile Software Development Agile?, , , , , , , , , and 37 other author(s). IEEE Trans. Software Eng., 48 (9): 3523-3539 (2022)Security patterns and requirements for internet-based applications., , , and . Internet Res., 16 (5): 519-536 (2006)