From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems., , и . IEICE Trans. Inf. Syst., 94-D (2): 243-254 (2011)Obtaining Security Requirements for a Mobile Grid System., , , и . Int. J. Grid High Perform. Comput., 1 (3): 1-17 (2009)Security Analysis in the Migration to Cloud Environments., , , и . Future Internet, 4 (2): 469-487 (2012)Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , и . Internet Things, (декабря 2023)Defining Security Architectural Patterns Based on Viewpoints., , , и . ICCSA (3), том 4707 из Lecture Notes in Computer Science, стр. 262-272. Springer, (2007)Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study., , , и . WOSIS, стр. 26-37. SciTePress, (2014)MARISMA-BiDa pattern: Integrated risk analysis for big data., , , , , и . Comput. Secur., (2021)Managing Security and its Maturity in Small and Medium-sized Enterprises., , , и . J. Univers. Comput. Sci., 15 (15): 3038-3058 (2009)An ontology-based secure design framework for graph-based databases., , , , , и . Comput. Stand. Interfaces, (марта 2024)Systematic review of SIEM technology: SIEM-SC birth., , , и . Int. J. Inf. Sec., 22 (3): 691-711 (июня 2023)