Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Security In: A Road to Competency., and . IEEE Secur. Priv., 11 (5): 89-92 (2013)Advances in Software Engineering and Software Assurance., , and . Adv. Comput., (2016)Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations., , and . AMCIS, Association for Information Systems, (2011)Software Requirements Engineering - Preface.. Ann. Softw. Eng., (1997)Education Trends and Their Impact on Management of Software Engineering Education.. CSEE, volume 895 of Lecture Notes in Computer Science, page 419-428. Springer, (1995)Software Engineering: Graduate-Level Courses for AFIT Professional Continuing Education., and . CSEE, volume 536 of Lecture Notes in Computer Science, page 114-126. Springer, (1991)Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda., , , , , , , , , and . Requir. Eng., 7 (3): 113-123 (2002)Principles and Measurement Models for Software Assurance., , and . Int. J. Secur. Softw. Eng., 4 (1): 1-10 (2013)Roundtable on Information Security Policy., , , , , , , , , and . IEEE Softw., 17 (5): 26-32 (2000)Using a multi-level design method under DOD-STD-2167A., and . WADAS, page 21-37. ACM, (1989)