20032019

Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

I am a research fellow at Monash University. My current research interest is to incorporate human-centric aspects into model-driven engineering practices with the objective to empower domain experts with limited programming skills to develop, change and extend software applications.

I have a background in both, academic and industry. Before joining Monash, I was a professor of applied computer science at the University of Applied Sciences Leipzig, Germany. I have also worked as research fellow at Data 61 and as postdoc at Swinburne university. I have published in the areas of software engineering, cybersecurity, service-oriented software systems and distributed (multi-agent) systems.

My industry experience includes work on a novel secure file sharing solution at Melbourne-based startup Lock Box and as an independent IT security consultant in Germany. I have also co-founded the German startup The Agent Factory with focus on agent-based computing and personalised mobile apps.

Education/Academic qualification

Computer Science, PhD, Swinburne University of Technology

Award Date: 22 Oct 2009

Research area keywords

  • Software Engineering
  • Requirements Engineering
  • Model-Driven Engineering
  • Usability
  • Accessibility

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Tele-audiology and security management: is anyone hearing the threats?

Harvey, R. & Mueller, I., 2019, Tele-Audiology and the Optimization of Hearing Healthcare Delivery. Saunders, E. (ed.). Hershey PA USA: IGI Global, p. 196-223 28 p. (Advances in Medical Technologies and Clinical Practice (AMTCP)).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Idea: A reference platform for systematic information security management tool support

Müller, I., Han, J., Schneider, J. G. & Versteeg, S., 7 Feb 2011, Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Proceedings. Springer, p. 256-263 8 p. (Lecture Notes in Computer Science; vol. 6542).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Tackling the loss of control: Standards-based conjoint management of security requirements for cloud services

Müller, I., Han, J., Schneider, J. G. & Versteeg, S., 29 Sep 2011, Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011. IEEE, Institute of Electrical and Electronics Engineers, p. 573-581 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

A case study on optimizing web service monitoring configurations

Heward, G., Han, J., Müller, I., Schneider, J. G. & Versteeg, S., 2010, Service-Oriented Computing - ICSOC 2010 International Workshops PAASC, WESOA, SEE, and SOC-LOG, Revised Selected Papers. Springer, p. 4-14 11 p. (Lecture Notes in Computer Science; vol. 6568 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access

An analysis of the cloud computing security problem

Almorsy, M., Grundy, J. & Mueller, I., 2010, In Proceedings of the Performance Assessment and Auditing in Service Computing Workshop 2010: held in conjunction with the 8th International Conference on Service-Oriented Computing (ICSOC’10). p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review