From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of statistical part of speech tagging of persian text., , , и . ISSPA, стр. 1-4. IEEE, (2007)It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls., , , , и . SafeConfig, стр. 53-62. ACM, (2010)Guidelines for designing IT security management tools., , , , и . CHIMIT, стр. 7. ACM, (2008)Investigating an appropriate design for personal firewalls., , , и . CHI Extended Abstracts, стр. 4123-4128. ACM, (2010)Promoting a physical security mental model for personal firewall warnings., , , , и . CHI Extended Abstracts, стр. 1585-1590. ACM, (2011)A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings., , , , и . SOUPS, стр. 1. ACM, (2011)Revealing hidden context: improving mental models of personal firewall users., , и . SOUPS, ACM, (2009)Using Rich Document Representation in XML Information Retrieval., , , и . INEX, том 4518 из Lecture Notes in Computer Science, стр. 294-301. Springer, (2006)Towards improving mental models of personal firewall users., , и . CHI Extended Abstracts, стр. 4633-4638. ACM, (2009)Effectiveness of Rich Document Representation in XML Retrieval., , , и . RIAO, стр. 241-250. CID, (2007)