From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specification and querying of security constraints in the EFSOC framework., , и . ICSOC, стр. 125-133. ACM, (2004)Modeling and Realizing Interoperability., , , , , , и . CAiSE Workshops (3), стр. 265-269. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)Trends Of Commonly Used Programming Languages in CS1 And CS2 Learning., , , и . ICCSE, стр. 407-412. IEEE, (2021)Enhancing Electronic Voting With A Dual-Blockchain Architecture., и . Ledger, (2021)Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling., и . SECRYPT, стр. 385-394. SCITEPRESS, (2021)Service-Oriented Modeling for Cyber Threat Analysis., и . CODASPY, стр. 150-152. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Using Capture-the-Flag to Enhance the Effectiveness of Cybersecurity Education., и . SIGITE, стр. 47-52. ACM, (2017)Exploring a Multi-Faceted Framework for SoC: How to Develop Secure Web-Service Interactions?, , и . RIDE, стр. 56-61. IEEE Computer Society, (2004)EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services., , и . Distributed Parallel Databases, 18 (2): 115-145 (2005)