Author of the publication

General Data Protection Law: Observations and Analysis of the Compliance Level of Organizations.

, , , , , and . EGOV-CeDEM-ePart-*, volume 3049 of CEUR Workshop Proceedings, page 325-329. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART)., and . ICISSP, page 147-156. SciTePress, (2017)Adversarial attacks on a lexical sentiment analysis classifier., , , and . Comput. Commun., (2021)Channel-Based RSA Approaches for QoS Protection of Slices Over Elastic Optical Networks., , , , , , , , and . IEEE Access, (2022)Tensor-Based Framework With Model Order Selection and High Accuracy Factor Decomposition for Time-Delay Estimation in Dynamic Multipath Scenarios., , , , , , and . IEEE Access, (2020)Certification and Authentication Services for Securing MANET Routing Protocols., , and . MWCN, World Scientific, (2003)A Study on APT in IoT Networks., , and . ICE-B, page 160-164. SCITEPRESS, (2021)Motivating attendee's participation in distance learning via an automatic messaging plugin for the moodle platform., , , , , , , and . FIE, page 1-5. IEEE Computer Society, (2016)Non-orthogonal multiple access schemes with partial relay selection., , , , and . IET Commun., 11 (6): 846-854 (2017)Time-delay estimation via procrustes estimation and Khatri-Rao factorization for GNSS multipath mitigation., , , and . ICSPCS, page 1-7. IEEE, (2017)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)