From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cascade Damage Estimation Model for Internet Attacks., , , и . WISI, том 3917 из Lecture Notes in Computer Science, стр. 163-164. Springer, (2006)The Value Gap Model: Value-Based Requirements Elicitation., , , и . CIT, стр. 885-890. IEEE Computer Society, (2007)An Odyssey Towards Best SCM Practices: The Big Picture., , и . SCM, том 1167 из Lecture Notes in Computer Science, стр. 231-238. Springer, (1996)A Security Risk Analysis Model for Information Systems., , , , , и . AsiaSim, том 3398 из Lecture Notes in Computer Science, стр. 505-513. Springer, (2004)Security Risk Vector for Quantitative Asset Assessment., , , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 274-283. Springer, (2005)Effective Appliance Selection by Complementary Context Feeding in Smart Home System., , и . SEUS, том 4761 из Lecture Notes in Computer Science, стр. 233-242. Springer, (2007)Cyber Threat Trend Analysis Model Using HMM., , , , и . IAS, стр. 177-182. IEEE Computer Society, (2007)Defending Battery Exhaustion Attacks on Mobile Systems., , и . COMPSAC (2), стр. 347-352. IEEE Computer Society, (2009)978-0-7695-3726-9.Effective Service Decision Using Ambient-Based HHMM in Smart Home System., , , и . CIT, стр. 979-984. IEEE Computer Society, (2007)Effective Security Safeguard Selection Process for Return on Security Investment., , и . APSCC, стр. 668-673. IEEE Computer Society, (2008)