From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Providing Security in Container-Based HPC Runtime Environments., , , и . ISC Workshops, том 9945 из Lecture Notes in Computer Science, стр. 685-695. (2016)An analysis of home user security awareness & education., , и . ICITST, стр. 116-122. IEEE, (2017)An Identification of Variables Influencing the Establishment of Information Security Culture., , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 436-448. Springer, (2015)Leveraging Biometrics for Insider Misuse Identification., , , и . Int. J. Cyber Situational Aware., 1 (1): 130-151 (2016)A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications., , , и . ICISSP, стр. 246-251. SciTePress, (2019)Multi-Platform Authorship Verification., , , и . CECC, стр. 13:1-13:7. ACM, (2019)Personal Knowledge Management - Beyond Versioning., , и . LWA, стр. 242-249. Fakultät für Informatik, Otto-von-Guericke-Universität Magdeburg, (2011)Information Security Risk Communication: A User-Centric Approach., , и . AICCSA, стр. 1-10. IEEE Computer Society, (2019)Editorial: Human aspects of cyber security., и . Inf. Comput. Secur., 32 (4): 405-406 (2024)Unified Intersection Over Union for Explainable Artificial Intelligence., , и . IntelliSys (2), том 823 из Lecture Notes in Networks and Systems, стр. 758-770. Springer, (2023)