Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to Security and Policy Section.. Handbook of Human Computation, Springer, (2013)Practical policy patterns.. CODASPY, page 225-230. ACM, (2011)Exploration in Massively Collaborative Problem Solving., , and . SocialCom/PASSAT, page 716-719. IEEE Computer Society, (2011)Introduction to Classic Papers.. ACSAC, page 161. IEEE Computer Society, (2001)Applying Security Lessons Learned to Human Computation Solving Systems.. Handbook of Human Computation, Springer, (2013)Solving Wicked Problems.. Handbook of Human Computation, Springer, (2013)Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing., , , , and . SACMAT, page 165-174. ACM, (2021)Secure Desktop Computing in the Cloud., , , and . CSCloud/EdgeCom, page 107-112. IEEE, (2019)FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)Lost Treasures., , and . IEEE Secur. Priv., 10 (6): 17-19 (2012)