From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Frontiers in Security Risk Management., , , и . IT Prof., 25 (3): 61-67 (мая 2023)Maritime cybersecurity: protecting digital seas., , , , и . Int. J. Inf. Sec., 23 (2): 1429-1457 (апреля 2024)Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems., , , , и . Future Internet, 8 (3): 36 (2016)Building ISMS through the Reuse of Knowledge., , , и . TrustBus, том 6264 из Lecture Notes in Computer Science, стр. 190-201. Springer, (2010)Towards a Quantum World in Cybersecurity Land., , , , , и . IS-EUD Workshops, том 3408 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Modelling language for cyber security incident handling for critical infrastructures., , , , и . Comput. Secur., (мая 2023)Development of an Expert System for the Evaluation of Students' Curricula on the Basis of Competencies., , , , , и . Future Internet, 8 (2): 22 (2016)Desirable Characteristics for an ISMS oriented to SMEs., , , и . WOSIS, стр. 151-158. SciTePress, (2011)Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs., , , и . WOSIS, стр. 159-166. SciTePress, (2011)Security Culture in Small and Medium-Size Enterprise., , , и . CENTERIS (2), том 110 из Communications in Computer and Information Science, стр. 315-324. Springer, (2010)