From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Policies in Object-Oriented Databases., , , и . DBSec, стр. 257-268. North-Holland, (1989)Patterns and Pattern Diagrams for Access Control., , и . TrustBus, том 5185 из Lecture Notes in Computer Science, стр. 38-47. Springer, (2008)xAPI-Based Model for Tracking On-line Laboratory Applications., и . FIE, стр. 1-9. IEEE, (2018)Some Security Issues of Wireless Systems., , , и . ISSADS, том 3563 из Lecture Notes in Computer Science, стр. 388-396. Springer, (2005)Relating Psychology's Moral Development Levels to the Ethical Use of Computers (Abstract)., и . ACM Conference on Computer Science, стр. 440. ACM, (1990)Attack Patterns: A New Forensic and Design Tool., , и . IFIP Int. Conf. Digital Forensics, том 242 из IFIP, стр. 345-357. Springer, (2007)Scalable. Ad Hoc, Low Cost, Mobile, Online Laboratories., , , , , , , , , и . LWMOOCS, стр. 155-158. IEEE, (2018)On building secure SCADA systems using security patterns., , , и . CSIIRW, стр. 17. ACM, (2009)A UML-Based Methodology for Secure Systems: The Design Stage ., , и . WOSIS, стр. 207-216. INSTICC Press, (2005)Cube-connected-cubes network., и . Microprocess. Microprogramming, 33 (5): 299-310 (1992)