Abstract is missing.
- Security Challenges in Cyber-Physical Production SystemsPeter Kieseberg, Edgar R. Weippl. 3-16 [doi]
- Monitoring of Access Control Policy for Refinement and ImprovementsAntonello Calabrò, Francesca Lonetti, Eda Marchetti. 17-36 [doi]
- On Evidence-Based Risk Management in Requirements EngineeringDaniel Méndez Fernández, Michaela Tießler, Marcos Kalinowski, Michael Felderer, Marco Kuhrmann. 39-59 [doi]
- Requirement-Based Testing - Extracting Logical Test Cases from Requirement DocumentsHarry M. Sneed. 60-79 [doi]
- Expert Sourcing to Support the Identification of Model Elements in System DescriptionsMarta Sabou, Dietmar Winkler, Sanja Petrovic. 83-99 [doi]
- Are Your Requirements Covered?Richard Mordinyi. 103-120 [doi]
- High Quality at Short Time-to-Market: Challenges Towards This Goal and Guidelines for the RealizationFrank Elberzhager, Matthias Naab. 121-132 [doi]
- Prioritizing Corrective Maintenance Activities for Android Applications: An Industrial Case Study on Android Crash ReportsValentina Lenarduzzi, Alexandru Cristian Stan, Davide Taibi, Gustavs Venters, Markus Windegger. 133-143 [doi]
- Evaluation of an Integrated Tool Environment for Experimentation in DSL EngineeringFlorian Häser, Michael Felderer, Ruth Breu. 147-168 [doi]
- Leveraging Smart Environments for Runtime Resources ManagementPaolo Barsocchi, Antonello Calabrò, Francesca Lonetti, Eda Marchetti, Filippo Palumbo. 171-190 [doi]