From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adoption of Social Media as a Communication Medium: A Study of Theoretical Foundations., , , и . UKAIS, стр. 10. (2015)Australia's Agenda for E-Security Education and Research.. World Conference on Information Security Education, том 253 из IFIP Conference Proceedings, стр. 109-114. Kluwer, (2003)ODESSA - a new approach to healthcare risk analysis., , и . SEC, том 92 из IFIP Conference Proceedings, стр. 391-402. Chapman & Hall, (1997)A Security Evaluation Criteria for Baseline Security Standards., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 79-90. Kluwer, (2002)Benchmarking E-business Security: A Model and Framework., и . AISM, стр. 80-87. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks., , , и . ISCSIC, стр. 154-158. IEEE, (2021)CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection., и . International Information Security Workshops, том 148 из IFIP, стр. 33-50. Kluwer, (2004)Striking a Balance Between Ethics and ICT Governance., и . Australas. J. Inf. Syst., (2006)A Telematics Security Training Application., , , и . EUROMEDIA, стр. 286-290. SCS, The Society for Computer Simulation International, (1996)Outsourcing System Security: A Theoretical Perspective., , и . ACIS, (2006)