From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guidelines for usable cybersecurity: Past and present., , , и . CSS, стр. 21-26. IEEE, (2011)Challenges to Process-Algebraic Property-Checking.. PDPTA, стр. 273-278. CSREA Press, (1999)A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate., , , , и . J. Cybersecur., 4 (1): tyy006 (2018)Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content., , , и . CIT/IUCC/DASC/PICom, стр. 461-468. IEEE, (2015)Predicting Graphical Passwords., , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 23-35. Springer, (2015)Analysis of Dependencies in Critical Infrastructures., , и . CRITIS, том 6983 из Lecture Notes in Computer Science, стр. 18-29. Springer, (2011)Programming in occam 2., и . Prentice Hall international series in computer science Prentice Hall, (1985)Critical Systems Validation and Verification with CSP and FDR., и . FM-Trends, том 1641 из Lecture Notes in Computer Science, стр. 243-250. Springer, (1998)Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement., , , и . CoRR, (2019)A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract., , , и . CRITIS, том 6712 из Lecture Notes in Computer Science, стр. 153-156. Springer, (2010)