Author of the publication

Knowledge Security - An Empirical Use of IT - Child Abuse Monitor System Model.

, and . ICT4AgeingWell, page 236-243. SCITEPRESS, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grid data mining by means of learning classifier systems and distributed model induction., , and . GECCO (Companion), page 391-398. ACM, (2011)Enhancing Login Security Through the Use of Keystroke Input Dynamics., , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 661-667. Springer, (2006)On the Use of Rough Sets for User Authentication Via Keystroke Dynamics., , and . EPIA Workshops, volume 4874 of Lecture Notes in Computer Science, page 145-159. Springer, (2007)Rethinking engineering education., , , , , and . FIE, page 1-5. IEEE Computer Society, (2017)Enrolment time as a requirement for biometric fingerprint recognition., , and . Int. J. Electron. Secur. Digit. Forensics, 6 (1): 18-24 (2014)A Security Audit Framework to Manage Information System Security., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 9-18. Springer, (2010)Study of the Perception on the Biometric Technology by the Portuguese Citizens., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 280-287. Springer, (2011)Global perspectives on cybersecurity education., , , , , , , , and . ITiCSE, page 340-341. ACM, (2018)Security metrics to evaluate organizational IT security., and . ICEGOV, page 500-501. ACM, (2014)Modeling industrial embedded systems with UML., , and . CODES, page 18-22. ACM, (2000)