From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed component architectures security issues., , и . Comput. Stand. Interfaces, 27 (3): 269-284 (2005)The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government., и . MCIS, стр. 25. AISeL, (2018)Risk management for new information technology insertion in a shipping company., и . Operational Research, 1 (1): 7-16 (2001)Incorporating Security Requirements Into the Software Development Process., , , , , и . ECIW, стр. 21-28. Academic Conferences Limited, Reading, UK, (2005)IT convergence and security., , и . Electron. Commer. Res., 13 (3): 237-241 (2013)Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification., , , и . J. Comput. Secur., 16 (6): 761-790 (2008)A Meta-model for Assisting a Cloud Forensics Process., , , и . CRiSIS, том 9572 из Lecture Notes in Computer Science, стр. 177-187. Springer, (2015)An Agent Based Back-End RFID Tag Management System., , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 165-176. Springer, (2010)A Cluster-Based Framework for the Security of Medical Sensor Environments., , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 52-62. Springer, (2009)Modelling Cloud Forensic-Enabled Services., , и . TrustBus, том 10442 из Lecture Notes in Computer Science, стр. 147-163. Springer, (2017)