From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and analysis of influence power for information security decisions., , и . Perform. Evaluation, (2016)Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector., , , , и . Int. J. Medical Informatics, (2019)Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm., , , , , , , и . CoRR, (2014)Multiobjective sparse ensemble learning by means of evolutionary algorithms., , , , , , и . Decis. Support Syst., (2018)Published incidents and their proportions of human error., , , и . Inf. Comput. Secur., 27 (3): 343-357 (2019)Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis., , и . JCSG, том 12434 из Lecture Notes in Computer Science, стр. 117-131. Springer, (2020)A Portfolio Optimization Approach to Selection in Multiobjective Evolutionary Algorithms., , , и . PPSN, том 8672 из Lecture Notes in Computer Science, стр. 672-681. Springer, (2014)Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form., , , , , и . IEEE Access, (2019)Designing Strong Privacy Metrics Suites Using Evolutionary Optimization., и . ACM Trans. Priv. Secur., 24 (2): 12:1-12:35 (2021)Nudging for Quantitative Access Control Systems., , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 340-351. Springer, (2014)