From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A semantic based methodology to classify and protect sensitive data in medical records., , , и . IAS, стр. 240-246. IEEE, (2010)Optimizing secure Web Services with MAWeS: A case study., , , , и . SecureComm, стр. 144-153. IEEE, (2007)Toward Automated Threat Modeling of Edge Computing Systems., , , и . CSR, стр. 135-140. IEEE, (2021)A Cloud Application for Security Service Level Agreement Evaluation., , и . CLOSER, стр. 299-307. SciTePress, (2014)Towards Automatic Generation of Hardware Classifiers., , , , и . ICA3PP (2), том 8286 из Lecture Notes in Computer Science, стр. 125-132. Springer, (2013)DoS Protection in the Cloud through the SPECS Services., , , и . 3PGCIC, стр. 677-682. IEEE Computer Society, (2015)A First Step Towards an ISO-Based Information Security Domain Ontology., , и . WETICE, стр. 334-339. IEEE, (2019)Per-Service Security SLa: A New Model for Security Management in Clouds., , , , и . WETICE, стр. 83-88. IEEE Computer Society, (2016)Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions., , и . CloudCom, стр. 273-278. IEEE, (2023)A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service., , , и . CISIS, том 772 из Advances in Intelligent Systems and Computing, стр. 1002-1011. Springer, (2018)