A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources
暂无分享,去创建一个
Mathias Ekstedt | Matus Korman | Margus Välja | Robert Lagerström | M. Ekstedt | Robert Lagerström | M. Korman | Margus Välja
[1] Florian Matthes,et al. Automating Enterprise Architecture Documentation using an Enterprise Service Bus , 2012, AMCIS.
[2] Ruth Breu,et al. On Enterprise Architecture Change Events , 2012, TEAR/PRET.
[3] Alan MacCormack,et al. A Methodology for Operationalizing Enterprise Architecture and Evaluating Enterprise IT Flexibility , 2015 .
[4] James Clark,et al. XSL Transformations (XSLT) Version 1.0 , 1999 .
[5] Khurram Shahzad,et al. A Tool for Automatic Enterprise Architecture Modeling , 2011, CAiSE Forum.
[6] Markus Buschle,et al. Automatic data collection for enterprise architecture models , 2012, Software & Systems Modeling.
[7] Khurram Shahzad,et al. P2AMF: Predictive, Probabilistic Architecture Modeling Framework , 2013, IWEI.
[8] Pontus Johnson,et al. Assessment of Enterprise Information Security : Estimating the Credibility of the Results , 2005 .
[9] Markus Lupp,et al. Extensible Markup Language , 2008, Encyclopedia of GIS.
[10] Erhard Rahm,et al. Data Cleaning: Problems and Current Approaches , 2000, IEEE Data Eng. Bull..
[11] Ruth Breu,et al. Automation Processes for Enterprise Architecture Management , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.
[12] Robert Lagerström,et al. A Bayesian network for IT governance performance prediction , 2008, ICEC.
[13] Ruth Breu,et al. Requirements for Automated Enterprise Architecture Model Maintenance - A Requirements Analysis based on a Literature Review and an Exploratory Survey , 2011, ICEIS.
[14] Robert Lagerström,et al. A Framework for Service Interoperability Analysis using Enterprise Architecture Models , 2008, 2008 IEEE International Conference on Services Computing.
[15] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[16] Matthias Brückmann,et al. Some Process Patterns for Enterprise Architecture Management , 2009, Software Engineering.
[17] Robert Lagerström,et al. Enterprise architecture analysis with extended influence diagrams , 2007, Inf. Syst. Frontiers.
[18] Robert Lagerström,et al. Architecture analysis of enterprise systems modifiability - Models, analysis, and validation , 2010, J. Syst. Softw..
[19] Christopher D. Wickens,et al. A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[20] Mathias Ekstedt,et al. Enterprise Architecture Meta Models for IT/Business Alignment Situations , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference.
[21] JohnsonPontus,et al. Architecture analysis of enterprise systems modifiability , 2010 .
[22] Ruth Breu,et al. Enterprise Architecture Documentation: Empirical Analysis of Information Sources for Automation , 2013, 2013 46th Hawaii International Conference on System Sciences.
[23] Markus Buschle,et al. Enterprise Architecture Management's Impact on Information Technology Success , 2011, 2011 44th Hawaii International Conference on System Sciences.
[24] Robert Lagerström,et al. A method for creating entreprise architecture metamodels applied to systems modifiability , 2009, Int. J. Comput. Sci. Appl..
[25] C. M. Sperberg-McQueen,et al. Extensible markup language , 1997 .
[26] Khurram Shahzad,et al. P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language , 2015, IEEE Trans. Dependable Secur. Comput..
[27] Mathias Ekstedt,et al. Data Collection Prioritization for System Quality Analysis , 2009, Electron. Notes Theor. Comput. Sci..