From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Supporting the design of privacy-aware business processes via privacy process patterns., , , и . RCIS, стр. 187-198. IEEE, (2017)Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments., , , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2020)Writer Identification Using a Statistical and Model Based Approach., , и . ICFHR, стр. 589-594. IEEE Computer Society, (2014)A framework for detecting malformed messages in SIP networks., , , , и . LANMAN, IEEE, (2005)The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government., и . MCIS, стр. 25. AISeL, (2018)Incorporating Security Requirements Into the Software Development Process., , , , , и . ECIW, стр. 21-28. Academic Conferences Limited, Reading, UK, (2005)Risk management for new information technology insertion in a shipping company., и . Operational Research, 1 (1): 7-16 (2001)Distributed component architectures security issues., , и . Comput. Stand. Interfaces, 27 (3): 269-284 (2005)What Do We Know About Our Rights to Data Protection? A Greek Case Study., , и . e-Democracy, том 1111 из Communications in Computer and Information Science, стр. 18-33. Springer, (2019)Signaling-Oriented DoS Attacks in UMTS Networks., , , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2009)