From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Systematic literature review of virtual role., , , и . ICITST, стр. 738-743. IEEE, (2011)eInsurance Project: How to Develop Novel Electronic Services with Co-operation between Academics and Practitioners., , , и . J. Cases Inf. Technol., 12 (4): 35-49 (2010)Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation.. WISA, том 7115 из Lecture Notes in Computer Science, стр. 242-255. Springer, (2011)The Digital Forensics of Cyber-Attacks at Electrical Power Grid Substation., , , , и . ISDFS, стр. 1-6. IEEE, (2022)Proof-of-Concept for a Granular Incident Management Information Sharing Scheme., , , , , , и . AIIoT, стр. 515-520. IEEE, (2022)Towards security metrics-supported IP traceback., , и . ECSA Workshops, стр. 32. ACM, (2016)Fabrication of Porous Silicon Based Humidity Sensing Elements on Paper., , , , , , , , и . J. Sensors, (2015)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , и . COINS, стр. 1-4. IEEE, (2021)A New Approach to Electronic Services Using Game-Based Design., , и . EDOC Workshops, стр. 68. IEEE Computer Society, (2006)