From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms., , , и . Panhellenic Conference on Informatics, стр. 7-13. IEEE Computer Society, (2009)A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources., , , , , , и . ARES, стр. 83:1-83:10. ACM, (2019)Ασφάλεια διαδικτυακών πληροφοριακών συστημάτων. Aristotle University Of Thessaloniki, Greece, (2001)National Archive of PhD Theses: oai:10442/22817.Analyzing the selection and dynamic composition of web services in e-commerce transactions., , и . BCI, стр. 130-135. ACM, (2012)Security Model for XML Data., , и . International Conference on Internet Computing (1), стр. 400-406. CSREA Press, (2001)ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology., , , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 300-313. Springer, (2018)Supporting dynamic administration of RBAC in web-based collaborative applications during run-time., , , , и . Int. J. Inf. Comput. Secur., 2 (4): 328-352 (2008)Data Hiding in the SWF Format and Spreading through Social Network Services., , и . WDFIA, стр. 105-114. Plymouth University, UK, (2009)An Innovative Self-Healing Approach with STIX Data Utilisation., , , и . ICETE (2), стр. 645-651. ScitePress, (2020)Securing Healthgrid Environments., , , и . SECRYPT, стр. 394-401. INSTICC Press, (2007)