Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating security design into the software development process for e-commerce systems., and . Inf. Manag. Comput. Secur., 9 (3): 112-122 (2001)CRESDA: towards a personalized student advisory for professional development., , and . Interact. Learn. Environ., 29 (2): 329-342 (2021)Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice., , , and . INCoS, page 181-188. IEEE, (2013)A robust watermarking scheme for 3D triangular mesh models., , and . Pattern Recognit., 36 (11): 2603-2614 (2003)A Study of an E-schoolbag Supporting Flipped Classroom Model for Junior Mathematics Review Class., , , , , , and . ICHL, volume 9167 of Lecture Notes in Computer Science, page 243-254. Springer, (2015)Assisting the Authoring Process of IMS-LD Using Web Parsing Technique., and . ICWL, volume 6483 of Lecture Notes in Computer Science, page 21-30. Springer, (2010)A Study of Scientific Inquiry Activities in Smart Classrooms of a Primary School., , , and . ICBL, volume 9757 of Lecture Notes in Computer Science, page 24-36. Springer, (2016)Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection., and . TrustCom/ISPA/IUCC, page 241-248. IEEE Computer Society, (2013)Analysis of Cyber Range Scenario Design - -A Case Study., , and . ICBL, volume 14797 of Lecture Notes in Computer Science, page 322-332. Springer, (2024)Code of Practice: A Standard for Information Security Management., and . SEC, volume 92 of IFIP Conference Proceedings, page 78-90. Chapman & Hall, (1997)