From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure., , , , и . CRITIS, том 6027 из Lecture Notes in Computer Science, стр. 201-212. Springer, (2009)The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues., , , и . SPC, том 3934 из Lecture Notes in Computer Science, стр. 119-133. Springer, (2006)Trust in the Pi-Calculus., и . PPDP, стр. 103-114. ACM, (2001)Redesigning consent forms and processes for health research.. IPCC, стр. 1-2. IEEE, (2012)Performance Analysis of Indoor 5G NR Systems., , , , , и . CCNC, стр. 632-633. IEEE, (2024)Freeform surface induction from projected planar curves via neural networks., , , , и . ESANN, стр. 641-646. (2006)CS/SE Instructors Can Improve Student Writing without Reducing Class Time Devoted to Technical Content: Experimental Results., , , , , , и . ICSE (2), стр. 455-464. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology., , , , , , , , и . IEEE Symposium on Security and Privacy Workshops, стр. 151-158. IEEE Computer Society, (2015)Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications., , , , и . IWUC, стр. 49-61. INSTICC Press, (2006)AI and Information Warfare in 2025.. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 317-322. IEEE, (2019)