Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High performance AAA architecture for massive IPv4 networks., , and . Future Gener. Comput. Syst., 23 (2): 275-279 (2007)CSFs for HCI in Ubiquitous Computing Environments., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 616-620. Springer, (2005)A study on the development methodology of the business model in ubiquitous technology., and . Int. J. Technol. Manag., 38 (4): 424-438 (2007)Guest Editors' Introduction., , and . International Journal of Software Engineering and Knowledge Engineering, 20 (1): 17-18 (2010)Assessment on Security Risks of Customer Relationship Management Systems.. Int. J. Softw. Eng. Knowl. Eng., 20 (1): 103-109 (2010)Governance of Information Security: New Paradigm of Security Management.. Computational Intelligence in Information Assurance and Security, volume 57 of Studies in Computational Intelligence, Springer, (2007)Integrated Security Framework for Industrial R&d Environments.. Int. J. Softw. Eng. Knowl. Eng., 20 (1): 19-25 (2010)Universal Verification Platform and Star Simulator for Fast Star Tracker Design., , , , , , , , and . Sensors, 21 (3): 907 (2021)Security Engineering Methodology Based on Problem Solving Theory., and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 639-648. Springer, (2006)A Case Study on the Development of Employee Internet Management System., and . ICCSA (3), volume 3482 of Lecture Notes in Computer Science, page 1229-1238. Springer, (2005)