Author of the publication

Using ontologies to perform threat analysis and develop defensive strategies for mobile security.

, , , and . Inf. Technol. Manag., 18 (1): 1-25 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Boundaries Spanning Enhances ISD Project Team Performance., , , and . PACIS, page 52. (2015)A Dynamic Adjustment Strategy for File Transformation in Data Grids., , and . NPC, volume 4672 of Lecture Notes in Computer Science, page 61-70. Springer, (2007)Robust Parking Space Detection Considering Inter-Space Correlation., , , , and . ICME, page 659-662. IEEE Computer Society, (2007)Using ontologies to perform threat analysis and develop defensive strategies for mobile security., , , and . Inf. Technol. Manag., 18 (1): 1-25 (2017)Implementation of a dynamic adjustment mechanism with efficient replica selection in data grid environments., , , and . SAC, page 797-804. ACM, (2006)A new dual -Gm structure with Class-AB operation of low-power low-phase-noise K-band CMOS VCO., and . IEICE Electron. Express, 11 (11): 20140250 (2014)Exploring the Effective of Unexpectedness: An Extension of Expectation-Disconfirmation Theory., and . ICSSI, page 254-255. IEEE Computer Society, (2013)Logic Circuit Design Based on MOS-NDR Devices and Circuits Fabricated by CMOS Process., , , , , , , , and . IWSOC, page 392-395. IEEE Computer Society, (2005)Novel Voltage-Controlled Oscillator Design by MOS-NDR Devices and Circuits., , , , , , , , and . IWSOC, page 372-375. IEEE Computer Society, (2005)A Recursively-Adjusting Co-allocation scheme with a Cyber-Transformer in Data Grids., , , , and . Future Gener. Comput. Syst., 25 (7): 695-703 (2009)