From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guidelines for usable cybersecurity: Past and present., , , и . CSS, стр. 21-26. IEEE, (2011)Predicting Graphical Passwords., , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 23-35. Springer, (2015)Analysis of Dependencies in Critical Infrastructures., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 18-29. Springer, (2011)A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate., , , , и . J. Cybersecur., 4 (1): tyy006 (2018)Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content., , , и . CIT/IUCC/DASC/PICom, стр. 461-468. IEEE, (2015)Challenges to Process-Algebraic Property-Checking.. PDPTA, стр. 273-278. CSREA Press, (1999)A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract., , , и . CRITIS, том 6712 из Lecture Notes in Computer Science, стр. 153-156. Springer, (2010)Programming in occam 2., и . Prentice Hall international series in computer science Prentice Hall, (1985)Critical Systems Validation and Verification with CSP and FDR., и . FM-Trends, том 1641 из Lecture Notes in Computer Science, стр. 243-250. Springer, (1998)Using Information Trustworthiness Advice in Decision Making., , , и . STAST, стр. 35-42. IEEE Computer Society, (2012)