From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Process Mining to Formalise Service Level Agreement (SLA) Allocation., , , , и . SmartWorld/SCALCOM/UIC/ATC/IOP/SCI, стр. 671-676. IEEE, (2021)Aligning Cyber-Security Training to Individual Cognitive Style., , , , , , и . HAISA, стр. 132-142. University of Plymouth, (2019)Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness., , и . HAISA, стр. 145-155. University of Plymouth, (2017)Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data., , , и . CoRR, (2024)TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT., , , , , , , , , и . Comput. Networks, (2024)Towards Web3 Applications: Easing the Access and Transition., , , , , , , и . CoRR, (2022)Toward Web3 Applications: Easing the Access and Transition., , , , , , , и . IEEE Trans. Comput. Soc. Syst., 11 (5): 6098-6111 (октября 2024)IoT Device Lifecycle Management., , , , , , , , , и 1 other автор(ы). TrustCom, стр. 1865-1870. IEEE, (2023)Capacity Analysis of Public Blockchain., , , , , , и . CoRR, (2021)Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?, , и . HCI (30), том 12210 из Lecture Notes in Computer Science, стр. 217-231. Springer, (2020)