From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Responding to intrusions in mobile ad hoc networks., , и . WorldCIS, стр. 30-34. IEEE, (2013)An Enhanced Threat Identification Approach for Collusion Threats., , , и . Metrisec@ESEM, стр. 25-30. IEEE, (2011)Fingerprint security for protecting EMV payment cards., , и . ICITST, стр. 95-101. IEEE, (2015)Collusion threat profile analysis: Review and analysis of MERIT model., , , , и . WorldCIS, стр. 212-217. IEEE, (2012)A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management., , , и . WorldCIS, стр. 150-157. IEEE, (2012)Enhanced User Security and Privacy Protection in 4G LTE Network., , и . COMPSAC Workshops, стр. 443-448. IEEE Computer Society, (2016)978-1-4673-8845-0.Threat Modeling for CSRF Attacks., , , и . CSE (3), стр. 486-491. IEEE Computer Society, (2009)Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment., , , и . SocialCom/PASSAT, стр. 1119-1124. IEEE Computer Society, (2011)Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles., , , и . SocialCom/PASSAT, стр. 1220-1223. IEEE Computer Society, (2011)An Analysis of CVSS v2 Environmental Scoring., , , и . SocialCom/PASSAT, стр. 1125-1130. IEEE Computer Society, (2011)