From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls., , , , и . SafeConfig, стр. 53-62. ACM, (2010)Heuristics for evaluating IT security management tools., , , и . CHI Extended Abstracts, стр. 1633-1638. ACM, (2011)RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems., , , и . EUROMICRO-SEAA, стр. 232-239. IEEE Computer Society, (2005)To Befriend Or Not? A Model of Friend Request Acceptance on Facebook., , , и . SOUPS, стр. 285-300. USENIX Association, (2014)Heuristics for evaluating IT security management tools., , , , и . SOUPS, стр. 7. ACM, (2011)Helping users review and make sense of access policies in organizations., , и . CHI Extended Abstracts, стр. 2017-2022. ACM, (2014)To Authorize or Not Authorize: Helping Users Review Access Policies in Organizations., , и . SOUPS, стр. 301-320. USENIX Association, (2014)The challenges of using an intrusion detection system: is it worth the effort?, , , , и . SOUPS, стр. 107-118. ACM, (2008)A multi-method approach for user-centered design of identity management systems., , , и . SOUPS, ACM, (2009)Guidelines for designing IT security management tools., , , , и . CHIMIT, стр. 7. ACM, (2008)