Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a knowledge-sharing approach for Information Security Risk Management., and . JCKBSE, volume 180 of Frontiers in Artificial Intelligence and Applications, page 453-461. IOS Press, (2008)Guided Crowdsourcing for Collective Work Coordination in Corporate Environments., , , and . ICCCI, volume 8083 of Lecture Notes in Computer Science, page 90-99. Springer, (2013)Planning for a Successful Corporate Wiki., , , , and . DEIS, volume 194 of Communications in Computer and Information Science, page 425-439. Springer, (2011)Wikis in enterprise settings: a survey., , , , and . Enterprise IS, 6 (1): 1-53 (2012)Collaboration and Knowledge Sharing Platform for Supporting a Risk Management Network of Practice., and . ICIW, page 239-244. IEEE Computer Society, (2008)Optimal power allocation in block fading Gaussian channels with causal CSI and secrecy constraints., , and . GLOBECOM, page 752-757. IEEE, (2014)Ontology-based Operational Risk Management., , , , , , and . CEC, page 153-160. IEEE Computer Society, (2011)Patrolling a Pipeline., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 129-138. Springer, (2016)Exploiting mobility diversity in rate adaptive CDMA networks., , and . Comput. Electr. Eng., 32 (1-3): 65-77 (2006)Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks., , , and . PerCom Workshops, page 303-307. IEEE Computer Society, (2014)