From post

Youtube User and Usage Profiling: Stories of Political Horror and Security Success.

, , , и . ICETE (Selected Papers), том 456 из Communications in Computer and Information Science, стр. 270-289. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

E-Passports as a Means Towards the First World-Wide Public Key Infrastructure., и . EuroPKI, том 4582 из Lecture Notes in Computer Science, стр. 34-48. Springer, (2007)Attack Modeling of SIP-Oriented SPIT., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 299-310. Springer, (2007)Editorial., и . Comput. Secur., 29 (1): 1-2 (2010)Assessing n-order dependencies between critical infrastructures., , и . Int. J. Crit. Infrastructures, 9 (1/2): 93-110 (2013)Security Busters: Web browser security vs. rogue sites., , , и . Comput. Secur., (2015)A Cloud Provider-Agnostic Secure Storage Protocol., , и . CRITIS, том 6712 из Lecture Notes in Computer Science, стр. 104-115. Springer, (2010)Browser Blacklists: The Utopia of Phishing Protection., , , , и . ICETE (Selected Papers), том 554 из Communications in Computer and Information Science, стр. 278-293. Springer, (2014)Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0., , и . Int. J. Inf. Sec., 21 (1): 37-59 (2022)Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures., , , , и . SIGMETRICS Perform. Evaluation Rev., 45 (2): 119-124 (2017)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)