From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A roadmap to risk-aware business process management., , и . APSCC, стр. 23-27. IEEE, (2009)Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula., , и . ERCIM News, 2022 (129): 0 (2022)An Open Source Code Analyzer and Reviewer (OSCAR) Framework., , , и . ARES, стр. 511-515. IEEE Computer Society, (2015)An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security., и . CECC, стр. 19:1-19:6. ACM, (2018)A Generic Approach to Critical Infrastructure Modeling and Simulation., , , и . CyberSecurity, стр. 144-151. IEEE Computer Society, (2012)APT RPG: Design of a Gamified Attacker/Defender Meta Model., , , и . ICISSP, стр. 526-537. SciTePress, (2018)Taxonomy of Data Fragment Classification Techniques., , и . ICDF2C, том 132 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 67-85. Springer, (2013)A reference model for risk-aware business process management., и . CRiSIS, стр. 82-89. IEEE, (2009)Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities., , и . SMC, стр. 2854-2859. IEEE, (2013)A process model for RFID based Business Process Analysis., , , , и . APSCC, стр. 478-483. IEEE, (2009)