Golnaz Elahi
According to our database1,
Golnaz Elahi
authored at least 20 papers
between 2005 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
PhD thesis, 2012
Comparing alternatives for analyzing requirements trade-offs - In the absence of numerical data.
Inf. Softw. Technol., 2012
2011
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
Requir. Eng., 2010
Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Data Knowl. Eng., 2009
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations.
Proceedings of the Conceptual Modeling, 2009
2008
Modeling Knowledge Transfer in a Software Maintenance Organization - An Experience Report and Critical Analysis.
Proceedings of the Practice of Enterprise Modeling, First IFIP WG 8.1 Working Conference, 2008
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Proceedings of the Conceptual Modeling, 2007
2005
RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline.
Proceedings of the Second World Enformatika Conference, 2005
RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems.
Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August, 2005