From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building a soft skill taxonomy from job openings., , , и . Soc. Netw. Anal. Min., 9 (1): 43:1-43:19 (2019)Securing the Internet of Things (IoT)., , , и . WINCOM, стр. 1-6. IEEE, (2018)An empirical study of global malware encounters., , и . HotSoS, стр. 8:1-8:11. ACM, (2015)Analysis of Hacking Related Trade in the Darkweb., , , и . ISI, стр. 79-84. IEEE, (2018)Privacy-Preserving Relationship Path Discovery in Social Networks., , , и . CANS, том 5888 из Lecture Notes in Computer Science, стр. 189-208. Springer, (2009)STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk., , , , и . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (марта 2023)A Trustable Reputation Scheme Based on Private Relationships., , , , и . ASONAM, стр. 19-24. IEEE Computer Society, (2009)Longitudinal analysis of a large corpus of cyber threat descriptions., , и . J. Comput. Virol. Hacking Tech., 12 (1): 11-22 (2016)Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach., , , и . Soc. Netw. Anal. Min., 5 (1): 5:1-5:21 (2015)A Data-driven Characterization of Modern Android Spyware., , , , и . ACM Trans. Manag. Inf. Syst., 11 (1): 4:1-4:38 (2020)