Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack Difficulty Metric for Assessment of Network Security., and . ARES, page 44:1-44:10. ACM, (2018)A dynamic model for short-term prediction of stream attributes., , and . Innov. Syst. Softw. Eng., 13 (4): 261-269 (2017)Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy., , and . Enterp. Inf. Syst., 10 (9): 1024-1046 (2016)A quantitative methodology for information security control gap analysis., , and . ICCCS, page 537-540. ACM, (2011)A two-phase quantitative methodology for enterprise information security risk analysis., , , and . CUBE, page 809-815. ACM, (2012)A Structured Control Selection Methodology for Insider Threat Mitigation., , and . CENTERIS/ProjMAN/HCist, volume 181 of Procedia Computer Science, page 1187-1195. Elsevier, (2020)Authoring Software for Higher Educational Environment., and . Applied Informatics, page 171-173. IASTED/ACTA Press, (1994)Resolving authorization conflicts by ontology views for controlled access to a digital library., , , and . J. Knowl. Manag., 19 (1): 45-59 (2015)A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System., , and . J. Netw. Syst. Manag., 19 (3): 319-342 (2011)An efficient technique for enhancing forensic capabilities of Ext2 file system., , , , and . Digit. Investig., 4 (Supplement): 55-61 (2007)