From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward risk-driven security measurement for Android smartphone platforms., , , , , и . ISSA, стр. 1-8. IEEE, (2013)Towards security metrics-supported IP traceback., , и . ECSA Workshops, стр. 32. ACM, (2016)Cyber security of smart metering of electricity consumption in Finland, , , и . 11th Nordic Electricity Distribution and Management Conference, Stockholm, Sweden, (сентября 2014)Improving Knowledge Sharing in Embedded Software Production Line., и . MARK@RE, стр. 68-72. IEEE Computer Society, (2008)A study on cybersecurity industrial end-user perspectives in Finland., , , и . ECSA (Companion), стр. 95-101. ACM, (2017)An Integrated QoS-Aware Service Development and Management Framework., , и . WICSA, стр. 13. IEEE Computer Society, (2007)A Taxonomy of Information Security for Service-Centric Systems., , и . EUROMICRO-SEAA, стр. 5-12. IEEE Computer Society, (2007)Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks., , , , , , , и . NEW2AN, том 5764 из Lecture Notes in Computer Science, стр. 97-109. Springer, (2009)Risk-driven security metrics development for software-defined networking., и . ECSA (Companion), стр. 56:1-56:5. ACM, (2018)Generating Pattern-Based Web Tutorials for Java Frameworks., , , и . FIDJI, том 2604 из Lecture Notes in Computer Science, стр. 99-110. Springer, (2002)