From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Frontiers in Security Risk Management., , , и . IT Prof., 25 (3): 61-67 (мая 2023)Maritime cybersecurity: protecting digital seas., , , , и . Int. J. Inf. Sec., 23 (2): 1429-1457 (апреля 2024)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , и . Future Internet, 8 (3): 36 (2016)Building ISMS through the Reuse of Knowledge., , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 190-201. Springer, (2010)Towards a Quantum World in Cybersecurity Land., , , , , и . IS-EUD Workshops, том 3408 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies., , , , , и . Future Internet, 8 (2): 22 (2016)Modelling language for cyber security incident handling for critical infrastructures., , , , и . Comput. Secur., (мая 2023)QISS: Quantum-Enhanced Sustainable Security Incident Handling in the IoT., , и . Inf., 15 (4): 181 (апреля 2024)The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets., , , , и . Future Internet, 8 (3): 30 (2016)Minimizing incident response time in real-world scenarios using quantum computing., , , , , , , и . Softw. Qual. J., 32 (1): 163-192 (марта 2024)