Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing Design Information Using Peer-to-Peer Computing., , and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 73-81. Springer, (2006)A Security Incident Data Model., , and . SEC, volume 214 of IFIP Conference Proceedings, page 481-494. Kluwer, (2002)Implementing it governance using COBIT: A case study focusing on critical success factors., , , and . WorldCIS, page 144-149. IEEE, (2012)Building an Enterprise IT Security Management System., and . SEC, volume 250 of IFIP Conference Proceedings, page 181-192. Kluwer, (2003)Processing Data Structures in a Peer-To-Peer Network., , and . CSCWD, page 136-140. IEEE, (2006)An Enterprise IT Security Data Model., , and . ICEIS, page 885-891. (2002)Optimised Job-Shop Scheduling via Genetic Algorithm for a Manufacturing Production System., , and . ICSEng, volume 366 of Advances in Intelligent Systems and Computing, page 89-92. Springer, (2014)