Naved Ahmed
According to our database1,
Naved Ahmed
authored at least 15 papers
between 2011 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Inf. Syst., 2016
Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation.
Bus. Inf. Syst. Eng., 2016
2015
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015
Refining Security Requirement Elicitation from Business Processes using Method Engineering.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015
2014
Comput. Stand. Interfaces, 2014
Proceedings of the Joint Proceedings of REFSQ-2014 Workshops, 2014
Presentation and Validation of Method for Security Requirements Elicitation from Business Processes.
Proceedings of the Information Systems Engineering in Complex Environments, 2014
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014
2013
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
it Inf. Technol., 2013
Int. J. Inf. Syst. Model. Des., 2013
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013
2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012
Proceedings of the Business Process Management Workshops, 2012
2011
Towards transformation guidelines from secure tropos to misuse cases (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011