From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

OntoSPIT: SPIT management through ontologies., , , , и . Comput. Commun., 32 (1): 203-212 (2009)Attack Modeling of SIP-Oriented SPIT., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 299-310. Springer, (2007)A Secure Smartphone Applications Roll-out Scheme., , , и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 49-61. Springer, (2011)Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition., , , , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 249-260. Springer, (2012)An Ontology-Based Approach to Information Systems Security Management., , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 151-164. Springer, (2005)Smartphone Security Evaluation - The Malware Attack Case ., , , и . SECRYPT, стр. 25-36. SciTePress, (2011)On the Feasibility of Malware Attacks in Smartphone Platforms., , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 217-232. Springer, (2011)On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework., , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 236-249. Springer, (2013)Security-by-Ontology: A Knowledge-Centric Approach., , , и . SEC, том 201 из IFIP, стр. 99-110. Springer, (2006)A Qualitative Metrics Vector for the Awareness of Smartphone Security Users., , , и . TrustBus, том 8058 из Lecture Notes in Computer Science, стр. 173-184. Springer, (2013)