From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The insider threat to information systems and the effectiveness of ISO17799., , , и . Comput. Secur., 24 (6): 472-484 (2005)A multi-layer Criticality Assessment methodology based on interdependencies., , и . Comput. Secur., 29 (6): 643-658 (2010)Assessing n-order dependencies between critical infrastructures., , и . Int. J. Crit. Infrastructures, 9 (1/2): 93-110 (2013)Insider Threat and Information Security Management., и . Insider Threats in Cyber Security, том 49 из Advances in Information Security, Springer, (2010)Common Body of Knowledge for Information Security., и . IEEE Secur. Priv., 5 (2): 64-67 (2007)A Risk Assessment Method for Smartphones., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 443-456. Springer, (2012)Privacy Risk, Security, Accountability in the Cloud., , , и . CloudCom (1), стр. 177-184. IEEE Computer Society, (2013)In Cloud We Trust: Risk-Assessment-as-a-Service., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 100-110. Springer, (2013)Assessing Privacy Risks in Android: A User-Centric Approach., , и . RISK@ICTSS, том 8418 из Lecture Notes in Computer Science, стр. 21-37. Springer, (2013)Threat Analysis of the Session Initiation Protocol Regarding Spam., , , , и . IPCCC, стр. 426-433. IEEE Computer Society, (2007)