From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Quantum World in Cybersecurity Land., , , , , и . IS-EUD Workshops, том 3408 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)New Frontiers in Security Risk Management., , , и . IT Prof., 25 (3): 61-67 (мая 2023)Building ISMS through the Reuse of Knowledge., , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 190-201. Springer, (2010)Maritime cybersecurity: protecting digital seas., , , , и . Int. J. Inf. Sec., 23 (2): 1429-1457 (апреля 2024)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , и . Future Internet, 8 (3): 36 (2016)Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern., , , , , , и . Comput. Ind., (2022)Security policies by design in NoSQL document databases., , , , , , , и . J. Inf. Secur. Appl., (2022)MMSM-SME: Methodology for the Management of Security and its Maturity in SME., , , и . WOSIS, стр. 67-78. INSTICC Press, (2009)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals., , , , , , и . Frontiers Comput. Sci., 18 (3): 183808 (июня 2024)Modelling language for cyber security incident handling for critical infrastructures., , , , и . Comput. Secur., (мая 2023)