From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integrating security design into the software development process for e-commerce systems., и . Inf. Manag. Comput. Secur., 9 (3): 112-122 (2001)CRESDA: towards a personalized student advisory for professional development., , и . Interact. Learn. Environ., 29 (2): 329-342 (2021)Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice., , , и . INCoS, стр. 181-188. IEEE, (2013)A robust watermarking scheme for 3D triangular mesh models., , и . Pattern Recognit., 36 (11): 2603-2614 (2003)A Study of an E-schoolbag Supporting Flipped Classroom Model for Junior Mathematics Review Class., , , , , , и . ICHL, том 9167 из Lecture Notes in Computer Science, стр. 243-254. Springer, (2015)Assisting the Authoring Process of IMS-LD Using Web Parsing Technique., и . ICWL, том 6483 из Lecture Notes in Computer Science, стр. 21-30. Springer, (2010)A Study of Scientific Inquiry Activities in Smart Classrooms of a Primary School., , , и . ICBL, том 9757 из Lecture Notes in Computer Science, стр. 24-36. Springer, (2016)Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection., и . TrustCom/ISPA/IUCC, стр. 241-248. IEEE Computer Society, (2013)Analysis of Cyber Range Scenario Design - -A Case Study., , и . ICBL, том 14797 из Lecture Notes in Computer Science, стр. 322-332. Springer, (2024)Code of Practice: A Standard for Information Security Management., и . SEC, том 92 из IFIP Conference Proceedings, стр. 78-90. Chapman & Hall, (1997)