From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Remote Electronic Elections for the UK., и . PST, стр. 41-45. (2004)Augmenting password recovery with online profiling., , и . Digit. Investig., 8 (Supplement): S25-S33 (2011)An empirical comparison of data recovered from mobile forensic toolkits., , и . Digit. Investig., 10 (1): 44-55 (2013)Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues., и . ICSME, стр. 129-138. IEEE, (2022)An Evaluation Framework for Grid-based Learning Technologies., , , и . ICALT, стр. 200-204. IEEE Computer Society, (2007)Sciit: Aligning Source Control Management and Issue Tracking Architectures., , и . ICSME, стр. 402-405. IEEE, (2019)Investigating Information Security Risks of Mobile Device Use within Organizations., и . CoRR, (2013)Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security., , , , , , , , , и 3 other автор(ы). STM, том 7170 из Lecture Notes in Computer Science, стр. 28-39. Springer, (2011)Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming.. ACM Comput. Surv., 50 (4): 47:1-47:32 (2017)How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations., , и . HICSS, стр. 1-10. ScholarSpace, (2019)