Refreshing results…
Engineering topology aware adaptive security: Preventing requirements violations at runtime
Download from oro.open.ac.ukSelf-adaptation through incremental generative model transformations at runtime
Download from citeseerx.ist.psu.eduTopology Aware Adaptive Security
Download from hdl.handle.netDistilling privacy requirements for mobile applications
Download from citeseerx.ist.psu.eduPersonal informatics for non-geeks
Download from oro.open.ac.ukSpecifying software features for composition: A tool-supported approach
Download from ulir.ul.ieResolving vulnerability identification errors using security requirements on business process models
Download from ulir.ul.ieRequirements-driven adaptive digital forensics
Download from ulir.ul.ieEngineering adaptive privacy: on the role of privacy awareness requirements
Download from citeseerx.ist.psu.eduSpeculative requirements: Automatic detection of uncertainty in natural language requirements
Download from oro.open.ac.ukAn Aspect-Oriented Approach to Relating Security Requirements and Access Control
Download from www.researchgate.netA Hybrid Model for Automatic Emotion Recognition in Suicide Notes
Download from doi.orgCaprice: a tool for engineering adaptive privacy
Download from ulir.ul.ieAnalysing monitoring and switching problems for adaptive systems
Download from ulir.ul.iePrivacy arguments: analysing selective disclosure requirements for mobile applications
Download from www.researchgate.netAdaptive security and privacy in smart grids: a software engineering vision
Download from ulir.ul.ieMissing publications? Search for publications with a matching author name.