543 results on '"Heisel A"'
Search Results
2. Enabling Design for Circularity with Computational Tools
3. Pattern-Based Risk Identification for Model-Based Risk Management
4. Eyelid and Periocular Cutaneous Carcinomas
5. PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies
6. Meeting Strangers Online: Feature Models for Trustworthiness Assessment
7. The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media
8. Neue Ökologie: Future Visions of Climate Change
9. Risk Identification Based on Architectural Patterns
10. Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach
11. Risk Treatment: An Iterative Method for Identifying Controls
12. Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems
13. Model-Based Risk Analysis and Evaluation Using CORAS and CVSS
14. PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements
15. Systematic Asset Identification and Modeling During Requirements Engineering
16. Fault Tolerance Time Interval : How to define and handle
17. Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams
18. Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard
19. Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements
20. Combining Safety and Security in Autonomous Cars Using Blockchain Technologies
21. A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements
22. Integration of Development Interface Agreement, Supplier Safety Assessment and Safety Management for Driver Assistance Systems
23. The 2051 Munich Climate Conference : Future Visions of Climate Change
24. Towards an ILP Approach for Learning Privacy Heuristics from Users’ Regrets
25. Secure Data Processing in the Cloud
26. Meaning-Centered Men’s Groups (MCMG) for the Transition to Retirement
27. Trustworthiness Cases – Toward Preparation for the Trustworthiness Certification
28. Access-Control Prediction in Social Network Sites: Examining the Role of Homophily
29. Literatur als Reflexion in Extremsituationen: das Trizonesien-Lied
30. Functional Safety Processes and Advanced Driver Assistance Systems: Evolution or Revolution?
31. Augmented Learning on Anticipating Textbooks with Eye Tracking
32. Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model
33. Towards Systematic Privacy and Operability (PRIOP) Studies
34. Konfiguration und Rekonfiguration von Produktionssystemen
35. Online Self-disclosure: From Users’ Regrets to Instructional Awareness
36. Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects
37. Deriving Safety Requirements according to ISO 26262 for complex systems: A method applied in the automotive industry
38. Prothesenspezifische Aspekte
39. Gelenkerhaltende Maßnahmen
40. Postoperative Rehabilitation
41. Begutachtungsrichtlinien nach endoprothetischem Ersatz des Kniegelenkes
42. Qualitätskontrolle und Patientenmanagement
43. ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System
44. A Structured Comparison of Security Standards
45. Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis
46. Enhancing Business Process Models with Trustworthiness Requirements
47. Enhancing Psychological Resiliency in Older Men Facing Retirement with Meaning-Centered Men’s Groups
48. Understanding the Privacy Goal Intervenability
49. A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN
50. Sport- und Physiotherapie
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.