From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls., , , , и . SafeConfig, стр. 53-62. ACM, (2010)Heuristics for evaluating IT security management tools., , , и . CHI Extended Abstracts, стр. 1633-1638. ACM, (2011)RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems., , , и . EUROMICRO-SEAA, стр. 232-239. IEEE Computer Society, (2005)Helping users review and make sense of access policies in organizations., , и . CHI Extended Abstracts, стр. 2017-2022. ACM, (2014)Heuristics for evaluating IT security management tools., , , , и . SOUPS, стр. 7. ACM, (2011)To Befriend Or Not? A Model of Friend Request Acceptance on Facebook., , , и . SOUPS, стр. 285-300. USENIX Association, (2014)RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline., , , , и . WEC (2), стр. 208-212. Enformatika, Çanakkale, Turkey, (2005)Modeling Secure Architectural Connector with UML 2.0., , и . IMECS, стр. 1172-1176. Newswood Limited, (2007)A case study of enterprise identity management system adoption in an insurance organization., , , и . CHIMIT, ACM, (2009)Comparison of Global Computing with Grid Computing., , и . PDCAT, стр. 531-534. IEEE Computer Society, (2006)