Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Engineering: The Art of Attacks., , and . ARTIIS, volume 1485 of Communications in Computer and Information Science, page 474-483. Springer, (2021)A New Methodology for the Development of Secure and Paranoid Operating Systems.. CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 1207-1215. Elsevier, (2020)Security in Microservices Architectures., , and . CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 1225-1236. Elsevier, (2020)Methodology for Predictive Cyber Security Risk Assessment (PCSRA)., , and . CENTERIS/ProjMAN/HCist, page 1555-1563. Elsevier, (2022)Prototype of a paranoid mobile operating system distribution., , and . ISDFS, page 1-6. IEEE, (2019)Encryption File System Framework - Proof of Concept., , and . CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 1237-1246. Elsevier, (2020)Serverless Service Architectures and Security Minimals., and . ISDFS, page 1-6. IEEE, (2022)ChevroCrypto - Security & Cryptography Broker., , and . ISDFS, page 1-5. IEEE, (2022)ChevroCrypto - Blockchain Cryptographic File System Prototype., , and . CENTERIS/ProjMAN/HCist, page 1546-1554. Elsevier, (2022)