From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks., , , и . Conference on Information Security Management & Small Systems Security, том 200 из IFIP Conference Proceedings, стр. 87-98. Kluwer, (2001)Insider Threat Prediction Tool: Evaluating the probability of IT misuse., и . Comput. Secur., 21 (1): 62-73 (2002)Insider Threat Specification as a Threat Mitigation Technique., и . Insider Threats in Cyber Security, том 49 из Advances in Information Security, Springer, (2010)Towards an insider threat prediction specification language., , и . Inf. Manag. Comput. Secur., 14 (4): 361-381 (2006)A preliminary model of end user sophistication for insider threat prediction in IT systems., и . Comput. Secur., 24 (5): 371-380 (2005)The Insider Threat Prediction and Specification Language., и . INC, стр. 51-61. University of Plymouth, (2012)iRefIndex: A consolidated protein interaction database with provenance., , и . BMC Bioinform., (2008)