Author of the publication

Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems.

, , and . ISMICT, page 1-9. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An optimization framework for dynamic pipeline management in computing systems., , , , , , , and . Comput. Electr. Eng., (2019)Security and Trust Management for Virtual Organisations: GridTrust Approach., and . IFIPTM, volume 300 of IFIP Advances in Information and Communication Technology, page 306-309. Springer, (2009)A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures., , , , , and . IPDPS Workshops, page 1510-1517. IEEE, (2011)Security Requirements Analysis for Large-Scale Distributed File Systems., , , and . Euro-Par Workshops, volume 4375 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities., , , , , , and . NTMS, page 1-6. IEEE, (2019)RESERVOIR - A European Cloud Computing Project., and . ERCIM News, 2010 (83): 35 (2010)Protecting corporate ICT infrastructures by using digital forensics., , and . CISIM, page 255-258. IEEE, (2010)Deriving Policies from Grid Security Requirements Model., , and . CoreGRID Integration Workshop, page 151-163. Springer, (2006)Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals.. ARES, page 63:1-63:5. ACM, (2018)Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 146-159. Springer, (2009)