Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding Logical Vulnerability in Policies Using Three-Level Semantic Framework., , and . AIAI (4), volume 714 of IFIP Advances in Information and Communication Technology, page 276-289. Springer, (2024)Performance analyses of data bases integration technologies (ODBC, OLE DB)., and . CompSysTech, page 2061-2063. ACM, (2000)Frequency-time analysis of the interferences in a 220 V network., , and . ICC, page 118-122. IEEE, (2004)Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound., , and . TrustCom, page 1428-1436. IEEE, (2020)Impact of False Positives and False Negatives on Security Risks in Transactions Under Threat., , and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 50-66. Springer, (2021)Sub-workflow parallel implementation of aerosol optical depth retrieval from MODIS data case on a Grid platform., , , and . IGARSS, page 4176-4179. IEEE, (2014)Ontological Foundations of Modelling Security Policies for Logical Analytics., , and . AIAI (1), volume 583 of IFIP Advances in Information and Communication Technology, page 368-380. Springer, (2020)Teaching AJAX in web-centric courses., and . ITiCSE, page 311. ACM, (2007)Keystroke Dynamics using Auto Encoders., , , , and . Cyber Security, page 1-8. IEEE, (2019)Security Analytics Framework Validation Based on Threat Intelligence., , , and . CSCI, page 942-947. IEEE, (2022)