Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CERTS: a comparative evaluation method for risk management methodologies and tools., , , and . ACSAC, page 251-257. IEEE, (1990)Research in data security: policies and projects., , , , , , , , , and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 993-999. AFIPS Press, (1974)Internet voting: will it spur or corrupt democracy?. CFP, page 219-223. ACM, (2000)Motivations behind a role play at CFP: repeated assaults on the constitution by extremist property rights advocates.. CFP, page 1:1-1:4. ACM, (2002)Towards a Fail-Safe Approach to Secure Databases., and . S&P, page 18-21. IEEE Computer Society, (1980)Reach to Teach: Preparing Cybersecurity Experts as Adjunct Community College Faculty., , and . CSEDU (1), page 338-343. SciTePress, (2019)Cybersecurity Workforce Development Directions., , and . HAISA, page 1-12. University of Plymouth, (2012)Reducing Society's Vulnerability as Computers and Networks Proliferate.. IFIP Congress (2), volume A-13 of IFIP Transactions, page 554-563. North-Holland, (1992)Bugging the Digital Network.. Inf. Secur. J. A Glob. Perspect., 1 (4): 12-15 (1993)SECURATE - Security evaluation and analysis using fuzzy metrics., , and . AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 531-540. AFIPS Press, (1978)