From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk assessment of BYOD: Bring your own device., , , , , и . GCCE, стр. 1-4. IEEE, (2016)Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era., , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 737-749. Springer, (2017)Risk Assessment Quantification for Remote Learning Based on Lecture Type., , , , и . IIAI-AAI, стр. 561-567. IEEE, (2022)A method for service and billing management using connection paths., и . SNPD, стр. 632-638. IEEE Computer Society, (2015)A Visualization Model for Silent Cyber Risks Contained in Emerging Risks., , , , и . GCCE, стр. 498-499. IEEE, (2021)Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service., , , , , и . IIAI-AAI, стр. 1126-1131. IEEE Computer Society, (2016)A Study of Risk Assessment Quantification in Cloud Computing., , , , , , и . NBiS, стр. 426-431. IEEE Computer Society, (2014)Building a Security Aware Cloud by Extending Internal Control to Cloud., , и . ISADS, стр. 323-326. IEEE Computer Society, (2011)Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation., , , и . AINA (3), том 451 из Lecture Notes in Networks and Systems, стр. 324-333. Springer, (2022)Service and Billing Management Method for ICT Services., и . Int. J. Softw. Innov., 4 (2): 1-16 (2016)