Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2., , and . ICITST, page 355-360. IEEE, (2015)Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates., , and . ICSOC Workshops, volume 8954 of Lecture Notes in Computer Science, page 236-249. Springer, (2014)Security Evaluation Criteria of Open-Source Libraries., and . ICCSA (Workshops 5), volume 13381 of Lecture Notes in Computer Science, page 422-435. Springer, (2022)IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider., , and . Ann. des Télécommunications, 72 (5-6): 347-357 (2017)Crowdcrawling approach for community based plagiarism detection service.. WWW (Companion Volume), page 1093-1096. ACM, (2014)On the Number of Search Queries Required for Internet Plagiarism Detection., and . ICALT, page 482-483. IEEE Computer Society, (2009)Applying artificial intelligence to the educational data: an example of syllabus quality analysis., and . LAK, page 164-169. ACM, (2012)SCAP benchmark for Cisco router security configuration compliance., , and . ICITST, page 270-276. IEEE, (2015)Privacy Protection in Geolocation Monitoring Applications., , , , and . ICIIA, volume 1547 of Communications in Computer and Information Science, page 179-193. Springer, (2021)Exploring the Security of Software Defined Network Controllers., , , , and . ICIIA, volume 1547 of Communications in Computer and Information Science, page 165-178. Springer, (2021)