From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Managing social overlay networks in semantic open enterprise systems., , и . WIMS, стр. 50. ACM, (2011)Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems., , и . Int. J. Cooperative Inf. Syst., 21 (4): 297-342 (2012)Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations., , , и . ERCIM News, 2022 (129): 0 (2022)Supporting Network Formation through Mining under Privacy Constraints., , и . SAINT, стр. 105-108. IEEE Computer Society, (2010)Computational Social Network Management in Crowdsourcing Environments., , и . ICECCS, стр. 273-282. IEEE Computer Society, (2011)Correlating cyber incident information to establish situational awareness in Critical Infrastructures., , , , , и . PST, стр. 78-81. IEEE, (2016)An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities., и . ADBIS, том 6909 из Lecture Notes in Computer Science, стр. 285-301. Springer, (2011)Information Management and Sharing for National Cyber Situational Awareness., , и . ISSE, стр. 217-227. Springer, (2012)Under false flag: using technical artifacts for cyber attack attribution., и . Cybersecur., 3 (1): 8 (2020)Keine Cyber-Sicherheit ohne Datenschutz., , и . Datenschutz und Datensicherheit, 39 (11): 723-729 (2015)