From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Decision Making Model of Influencing Behavior in Information Security., , , и . EPEW, том 8721 из Lecture Notes in Computer Science, стр. 194-208. Springer, (2014)Managed Utility Computing: The Grid as Management Backplane., , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 4-7. Springer, (2003)Quantitative Workflow Resiliency., , и . ESORICS (1), том 8712 из Lecture Notes in Computer Science, стр. 344-361. Springer, (2014)A Community Knowledge Base for IT Security., , и . IT Prof., 13 (3): 24-30 (2011)International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)., , и . DSN, стр. 542-543. IEEE Computer Society, (2008)Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms., , , , и . CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 321-336. Springer, (2013)Managed Utility Computing.. WISE, стр. 277. IEEE Computer Society, (2003)Grid, Management and Self-Management.. Comput. J., 48 (3): 325-332 (2005)Web Services Management Network: An Overlay Network for Federated Service Management., , и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 351-364. Kluwer, (2003)Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies., , , и . CASoN, стр. 25-30. IEEE, (2011)