From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revisiting Legal and Regulatory Requirements for Secure E-Voting., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 469-480. Kluwer, (2002)Profiling online social networks users: an omniopticon tool., , , и . IJSNM, 2 (4): 293-313 (2017)A Qualitative Approach to Information Availability., , и . SEC, том 175 из IFIP Conference Proceedings, стр. 37-48. Kluwer, (2000)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , и . ICETE (2), стр. 219-229. SciTePress, (2018)Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation., , и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2011)Browser Blacklists: The Utopia of Phishing Protection., , , , и . ICETE (Selected Papers), том 554 из Communications in Computer and Information Science, стр. 278-293. Springer, (2014)Critical Infrastructure Protection: A Holistic Methodology for Greece., , , , и . CyberICPS@ESORICS, том 10166 из Lecture Notes in Computer Science, стр. 19-34. Springer, (2016)Classification and Comparison of Critical Infrastructure Protection Tools., , , , и . Critical Infrastructure Protection, том 485 из IFIP Advances in Information and Communication Technology, стр. 239-255. (2016)Editorial., и . Comput. Secur., 29 (1): 1-2 (2010)Attack Modeling of SIP-Oriented SPIT., , , и . CRITIS, том 5141 из Lecture Notes in Computer Science, стр. 299-310. Springer, (2007)