Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Selection of Security Application Frameworks During Architectural Design., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider., , and . ICSSA, page 19-24. IEEE, (2015)IoE Security Threats and You., , , , , and . ICSSA, page 13-19. IEEE, (2017)Threat Modeling and Analysis of Voice Assistant Applications., , , , and . WISA, volume 11402 of Lecture Notes in Computer Science, page 197-209. Springer, (2018)A centralized trust model approach for cloud computing., , , , and . WOCC, page 1-6. IEEE, (2014)An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks., , , and . PST, page 1-6. IEEE Computer Society, (2018)Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)., , and . ICSSA, page 34-37. IEEE, (2018)KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services., , and . IMCOM, page 20:1-20:6. ACM, (2015)Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns., and . ARES, page 486-492. IEEE Computer Society, (2015)A Methodology for Mining Security Tactics from Security Patterns., , and . HICSS, page 1-5. IEEE Computer Society, (2010)