From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conflict Analysis in the "Subject-to-Subject" Security System., , , , и . CPITS, том 3421 из CEUR Workshop Proceedings, стр. 56-66. CEUR-WS.org, (2023)Information Security Risk Management using Cognitive Modeling (short paper)., , , , и . CPITS II, том 3550 из CEUR Workshop Proceedings, стр. 297-305. CEUR-WS.org, (2023)Information Security Risk Analysis SWOT (short paper)., , , , и . CPITS I, том 2923 из CEUR Workshop Proceedings, стр. 309-317. CEUR-WS.org, (2021)Encryption Method for Systems with Limited Computing Resources (short paper)., , , , и . CPITS, том 3288 из CEUR Workshop Proceedings, стр. 142-148. CEUR-WS.org, (2022)Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation., , , , и . CPITS II (1), том 3187 из CEUR Workshop Proceedings, стр. 89-102. CEUR-WS.org, (2021)Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare., , , , и . CPITS, том 3654 из CEUR Workshop Proceedings, стр. 290-300. CEUR-WS.org, (2024)Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels., , , , и . CPITS, том 3654 из CEUR Workshop Proceedings, стр. 333-342. CEUR-WS.org, (2024)