Author:
Ionita Dan,Wieringa Roel J.,Gordijn Jaap
Publisher
Springer International Publishing
Reference18 articles.
1. Reaves, B., Shernan, E., Bates, A., Carter, H., Traynor, P.: Boxed out: Blocking cellular interconnect bypass fraud at the network edge. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 833–848. Washington, D.C., USENIX Association, August 2015
2. Mohan, K., Ramesh, B.: Ontology-based support for variability management in product and families. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, pp. 9–18, January 2003
3. Studies in Computational Intelligence;J Carbo,2007
4. Service Science: Research and Innovations in the Service Economy;YH Tan,2011
5. Lecture Notes in Business Information Processing;I Soomro,2013
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Value Modeling for Ecosystem Analysis;Computers;2019-09-13
2. A Business Ecosystem Architecture Modeling Framework;2019 IEEE 21st Conference on Business Informatics (CBI);2019-07
3. Quantitative, Value-Driven Risk Analysis of e-Services;Journal of Information Systems;2018-06-01
4. Value-Driven Risk Analysis of Coordination Models;Lecture Notes in Business Information Processing;2016