From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model., , и . AMCIS, Association for Information Systems, (2014)Enterprise Social Networks: A Successful Implementation within a Telecommunication Company., , и . AMCIS, Association for Information Systems, (2015)A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , и . TrustCom/BigDataSE/ISPA (1), стр. 1094-1101. IEEE, (2015)Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective., , , и . AMCIS, Association for Information Systems, (2015)Cloud forensics: State-of-the-art and future directions., , , и . Digital Investigation, (2016)Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies., , , и . CoRR, (2016)Guest Editorial: Multimedia Social Network Security and Applications., и . Multimedia Tools Appl., 76 (3): 3163-3168 (2017)Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study., , и . CoRR, (2018)Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode., , , и . IACR Cryptology ePrint Archive, (2007)