From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Business and Legislative Perspective of V2X and Mobility Applications in 5G Networks., , , , , , и . IEEE Access, (2020)A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections., и . SIGCSE, стр. 16-22. ACM, (2020)Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter., , и . TrustCom, стр. 1228-1235. IEEE, (2020)ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems., и . POLICY, стр. 61-69. IEEE Computer Society, (2012)Global perspectives on cybersecurity education for 2030: a case for a meta-discipline., , , , , , , и . ITiCSE (Companion), стр. 36-54. ACM, (2018)ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage., , , и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 189-205. Springer, (2017)Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection., , , и . TrustCom/BigDataSE, стр. 442-449. IEEE, (2019)Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems., , , , и . TrustCom/BigDataSE, стр. 1624-1627. IEEE, (2018)Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC., , и . ACM Conference on Computer and Communications Security, стр. 841-844. ACM, (2011)Cybersecurity in industrial control systems: Issues, technologies, and challenges., , и . Comput. Networks, (2019)