Author of the publication

CAESAR8: An agile enterprise architecture approach to managing information security risks.

, , , and . Comput. Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opportunistic downlink scheduling for multiuser OFDM systems., , and . WCNC, page 1206-1212. IEEE, (2005)Multi-View Triangulation: Systematic Comparison and an Improved Method., , , , , and . IEEE Access, (2020)高动态自组织无人机网络架构设计与模式研究 (Architecture Design and Mode Research of High-dynamic Self-organizing UAV Network)., , and . 计算机科学, 42 (2): 50-54 (2015)Learning to name faces: a multimodal learning scheme for search-based face annotation., , , , , and . SIGIR, page 443-452. ACM, (2013)Pharmacotherapeutic Effects of Quinidine on Short QT Syndrome by Using Purkinje-Ventricle Model: A Simulation Study., , , , , , and . EMBC, page 2856-2859. IEEE, (2019)Patent-bibliometric analysis on the Chinese science - technology linkages., and . Scientometrics, 72 (3): 403-425 (2007)Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster., , , and . CNS, page 1-2. IEEE, (2020)Delta DLP 3D printing with large size., , , , and . IROS, page 2155-2160. IEEE, (2016)Enhancing Video Rate Adaptation With Mobile Edge Computing and Caching in Software-Defined Mobile Networks., , , and . IEEE Trans. Wirel. Commun., 17 (10): 7013-7026 (2018)Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 166-179 (2014)