Cited By
View all- Fuchs ARieke R(2010)Identification of Security Requirements in Systems of Systems by Functional Security AnalysisArchitecting Dependable Systems VII10.1007/978-3-642-17245-8_4(74-96)Online publication date: 2010
- Rieke RStoynova Z(2010)Predictive Security Analysis for Event-Driven ProcessesComputer Network Security10.1007/978-3-642-14706-7_25(321-328)Online publication date: 2010
- Kokolakis SRizomiliotis PBenameur ASinha S(2009)Security and Dependability Solutions for Web Services and WorkflowsSecurity and Dependability for Ambient Intelligence10.1007/978-0-387-88775-3_6(97-106)Online publication date: 31-Mar-2009
- Show More Cited By