From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1073-1080. IEEE, (2015)Android Cache Taxonomy and Forensic Process., , и . TrustCom/BigDataSE/ISPA (1), стр. 1094-1101. IEEE, (2015)Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective., , , и . AMCIS, Association for Information Systems, (2015)Enterprise Social Networks: A Successful Implementation within a Telecommunication Company., , и . AMCIS, Association for Information Systems, (2015)Cloud forensics: State-of-the-art and future directions., , , и . Digital Investigation, (2016)Guest Editorial: Multimedia Social Network Security and Applications., и . Multimedia Tools Appl., 76 (3): 3163-3168 (2017)Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies., , , и . CoRR, (2016)Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study., , и . CoRR, (2018)Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model., , и . AMCIS, Association for Information Systems, (2014)Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction., , , , , и . IEEE Trans. Comput. Social Systems, 7 (1): 234-246 (2020)