From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?, , и . UIC/ATC, стр. 396-403. IEEE Computer Society, (2013)The Insider Threat in Cloud Computing., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 93-103. Springer, (2011)An Insider Threat Prediction Model., , , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 26-37. Springer, (2010)Mobile Devices - A Phisher's Paradise., , , и . SECRYPT, стр. 79-87. SciTePress, (2014)The Big Four - What We Did Wrong in Advanced Persistent Threat Detection?, и . ARES, стр. 248-254. IEEE Computer Society, (2013)Browser Blacklists: The Utopia of Phishing Protection., , , , и . ICETE (Selected Papers), том 554 из Communications in Computer and Information Science, стр. 278-293. Springer, (2014)Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation., , и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2011)A Cloud Provider-Agnostic Secure Storage Protocol., , и . CRITIS, том 6712 из Lecture Notes in Computer Science, стр. 104-115. Springer, (2010)Fighting an unfair battle: unconventional defenses against advanced persistent threats. Athens University Economics and Business, Greece, (2015)National Archive of PhD Theses: oai:10442/36514.Security Busters: Web browser security vs. rogue sites., , , и . Comput. Secur., (2015)