Filter your results
- 4
- 4
- 4
- 3
- 1
- 2
- 1
- 4
- 4
- 1
- 1
|
|
sorted by
|
|
A Proposal on Security Case Based on Common Criteria1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers
hal-01480190v1
|
||
|
An Approach for Evaluating Softgoals Using Weight3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.203-212, ⟨10.1007/978-3-319-24315-3_20⟩
Conference papers
hal-01466221v1
|
||
|
A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method ArchitectureInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.17-28, ⟨10.1007/978-3-319-10975-6_2⟩
Conference papers
hal-01403983v1
|
||
|
An Evaluation of Argument Patterns Based on Data Flow2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.432-437, ⟨10.1007/978-3-642-55032-4_43⟩
Conference papers
hal-01397249v1
|