From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An optimization framework for dynamic pipeline management in computing systems., , , , , , , и . Comput. Electr. Eng., (2019)Security and Trust Management for Virtual Organisations: GridTrust Approach., и . IFIPTM, том 300 из IFIP Advances in Information and Communication Technology, стр. 306-309. Springer, (2009)A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures., , , , , и . IPDPS Workshops, стр. 1510-1517. IEEE, (2011)Security Requirements Analysis for Large-Scale Distributed File Systems., , , и . Euro-Par Workshops, том 4375 из Lecture Notes in Computer Science, стр. 49-60. Springer, (2006)Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities., , , , , , и . NTMS, стр. 1-6. IEEE, (2019)Protecting corporate ICT infrastructures by using digital forensics., , и . CISIM, стр. 255-258. IEEE, (2010)Deriving Policies from Grid Security Requirements Model., , и . CoreGRID Integration Workshop, стр. 151-163. Springer, (2006)RESERVOIR - A European Cloud Computing Project., и . ERCIM News, 2010 (83): 35 (2010)Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals.. ARES, стр. 63:1-63:5. ACM, (2018)VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing., и . NCA, стр. 362-365. IEEE Computer Society, (2004)