Cited By
View all- Gama DBrito AMartin AFetzer C(2024)Supporting continuous vulnerability compliance through automated identity provisioningProceedings of the 13th Latin-American Symposium on Dependable and Secure Computing10.1145/3697090.3697098(101-110)Online publication date: 26-Nov-2024
- Angermeir FFischbach JMoyón FMendez D(2024)Towards Automated Continuous Security ComplianceProceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement10.1145/3674805.3690748(440-446)Online publication date: 24-Oct-2024
- Elahidoost PMendez DUnterkalmsteiner MFischbach JFeiler CStreit J(2024)Practices, Challenges, and Opportunities When Inferring Requirements From Regulations in the FinTech Sector - An Industrial Study2024 IEEE 32nd International Requirements Engineering Conference Workshops (REW)10.1109/REW61692.2024.00024(137-145)Online publication date: 24-Jun-2024
- Show More Cited By