From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and Assessment of Systems Security., , и . MODSEC@MoDELS, том 413 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Overview of Enterprise Information Needs in Information Security Risk Assessment., , , , и . EDOC, стр. 42-51. IEEE Computer Society, (2014)Designing & evaluating a cognitive prosthetic for people with mild dementia., , , , , , , , и . ECCE, стр. 11-18. Mediamatica, Delft University of Technology, The Netherlands / ACM, (2010)Home Based Assistive Technologies for People with Mild Dementia., , , , , , , , , и 2 other автор(ы). ICOST, том 4541 из Lecture Notes in Computer Science, стр. 63-69. Springer, (2007)Requirements engineering: The quest for the dependent variable., , и . RE, стр. 16-25. IEEE Computer Society, (2015)Assessing Information Security Risks using Pairwise Weighting., , и . ICISSP, стр. 318-324. SciTePress, (2017)Evaluation of Field Trial 1, и . (2007)CogKnow Article.Dissemination Master Plan, , , , , , , , и . (2007)CogKnow Article.Evaluation of Mobile and Home Based Cognitive Prosthetics., , , , , , , , , и 1 other автор(ы). ICOST, том 5120 из Lecture Notes in Computer Science, стр. 18-25. Springer, (2008)Using Agents for Long-Term Digital Reservation the PROTAGE Project., , , , и . DCAI, том 50 из Advances in Soft Computing, стр. 118-122. Springer, (2008)