From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets., , , , и . Future Internet, 8 (3): 30 (2016)Security Culture in Small and Medium-Size Enterprise., , , и . CENTERIS (2), том 110 из Communications in Computer and Information Science, стр. 315-324. Springer, (2010)Desirable Characteristics for an ISMS oriented to SMEs., , , и . WOSIS, стр. 151-158. SciTePress, (2011)Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs., , , и . WOSIS, стр. 159-166. SciTePress, (2011)MMSM-SME: Methodology for the Management of Security and its Maturity in SME., , , и . WOSIS, стр. 67-78. INSTICC Press, (2009)Security policies by design in NoSQL document databases., , , , , , , и . J. Inf. Secur. Appl., (2022)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals., , , , , , и . Frontiers Comput. Sci., 18 (3): 183808 (июня 2024)Towards a Quantum World in Cybersecurity Land., , , , , и . IS-EUD Workshops, том 3408 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , и . Future Internet, 8 (3): 36 (2016)New Frontiers in Security Risk Management., , , и . IT Prof., 25 (3): 61-67 (мая 2023)