From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Insider Threat in Cloud Computing., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 93-103. Springer, (2011)Insiders Trapped in the Mirror Reveal Themselves in Social Media., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2013)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)Monitoring Users' Behavior: Anti-Immigration Speech Detection on Twitter., , , , , и . Mach. Learn. Knowl. Extr., 2 (3): 192-215 (2020)Web Services Security Assessment: An Authentication-Focused Approach., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 561-566. Springer, (2012)Youtube User and Usage Profiling: Stories of Political Horror and Security Success., , , и . ICETE (Selected Papers), том 456 из Communications in Computer and Information Science, стр. 270-289. Springer, (2013)Approaching Encryption through Complex Number Logarithms., , и . SECRYPT, стр. 574-579. SciTePress, (2013)Proactive insider threat detection through social media: the YouTube case., , , и . WPES, стр. 261-266. ACM, (2013)Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module., , , и . Comput. Secur., (2017)Metasploit the Penetration Tester's Guide., и . Comput. Secur., (2013)