From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preventing TMTO Attack in AES-CCMP in IEEE 802.11i., , , , и . CN, том 291 из Communications in Computer and Information Science, стр. 181-190. Springer, (2012)Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture., , и . HAISA, стр. 88-100. University of Plymouth, (2016)Self-Competitive Neural Networks., и . ISVC (1), том 12509 из Lecture Notes in Computer Science, стр. 15-26. Springer, (2020)Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A., , и . ARES, стр. 259-264. IEEE Computer Society, (2014)Model-Agnostic Syntactical Information for Pre-Trained Programming Language Models., и . MSR, стр. 183-193. IEEE, (2023)The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001., , и . ARES, стр. 159-167. IEEE Computer Society, (2015)