-
1
-
-
84874276834
-
A survival analysis of application life spans based on enterprise architecture models
-
Ulm, Germany.
-
Aier, S., Buckl, S., Franke, U., Gleichauf, B., Johnson, P., Närman, P., Schweda, C., Ullberg, J.: A survival analysis of application life spans based on enterprise architecture models. In: 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, Ulm, Germany. pp. 141-154 (2009)
-
(2009)
3rd International Workshop on Enterprise Modelling and Information Systems Architectures
, pp. 141-154
-
-
Aier, S.1
Buckl, S.2
Franke, U.3
Gleichauf, B.4
Johnson, P.5
Närman, P.6
Schweda, C.7
Ullberg, J.8
-
2
-
-
84861139668
-
-
Mar
-
BiZZdesign: BiZZdesign Architect. http://www.bizzdesign.com (Mar 2011)
-
(2011)
BiZZdesign Architect.
-
-
-
3
-
-
84888312892
-
A tool for enterprise architecture analysis using the prm formalism
-
Buschle, M., Ullberg, J., Franke, U., Lagerström, R., Sommestad, T.: A tool for enterprise architecture analysis using the prm formalism. In: CAiSE2010 Forum PostProceedings (2010)
-
(2010)
CAiSE2010 Forum PostProceedings
-
-
Buschle, M.1
Ullberg, J.2
Franke, U.3
Lagerström, R.4
Sommestad, T.5
-
4
-
-
84880688943
-
Learning probabilistic relational models
-
Morgan Kaufman
-
Friedman, N., Getoor, L., Koller, D., Pfeffer, A.: Learning probabilistic relational models. In: Proc. of the 16th International Joint Conference on Artificial Intelligence. pp. 1300-1309. Morgan Kaufman (1999)
-
(1999)
Proc. of the 16th International Joint Conference on Artificial Intelligence
, pp. 1300-1309
-
-
Friedman, N.1
Getoor, L.2
Koller, D.3
Pfeffer, A.4
-
5
-
-
84890719686
-
A quantitative evaluation of vulnerability scanning
-
to be published
-
Holm, H., Sommestad, T., Almroth, J., Persson, M.: A quantitative evaluation of vulnerability scanning. Information Management & Computer Security (to be published)
-
Information Management & Computer Security
-
-
Holm, H.1
Sommestad, T.2
Almroth, J.3
Persson, M.4
-
6
-
-
85011904060
-
The technical specification for the security content automation protocol (SCAP)
-
Johnson, C., Quinn, S., Scarfone, K., Waltermire, D.: The technical specification for the security content automation protocol (SCAP). NIST Special Publication 800, 126 (2009)
-
(2009)
NIST Special Publication
, vol.800
, pp. 126
-
-
Johnson, C.1
Quinn, S.2
Scarfone, K.3
Waltermire, D.4
-
7
-
-
84892048357
-
-
Springer, Berlin, Heidelberg, Germany, 2nd edn
-
Lankhorst, M.M.: Enterprise Architecture at Work: Modelling, Communication and Analysis. Springer, Berlin, Heidelberg, Germany, 2nd edn. (2009)
-
(2009)
Enterprise Architecture at Work: Modelling, Communication and Analysis
-
-
Lankhorst, M.M.1
-
8
-
-
84890638007
-
-
Mar
-
Rapid7: NeXpose. http://www.rapid7.com/ (Mar 2011)
-
(2011)
NeXpose
-
-
-
9
-
-
77955417822
-
A probabilistic relational model for security risk analysis
-
Sommestad, T., Ekstedt, M., Johnson, P.: A probabilistic relational model for security risk analysis. Computers & Security 29(6), 659-679 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.6
, pp. 659-679
-
-
Sommestad, T.1
Ekstedt, M.2
Johnson, P.3
-
11
-
-
84890771678
-
-
Mar
-
Troux Technologies: Metis. http://www.troux.com/products/ (Mar 2011)
-
(2011)
Metis
-
-
|