From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement., и . TrustCom/BigDataSE/ISPA (1), стр. 1088-1093. IEEE, (2015)Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?, , , и . ES, том 10131 из Lecture Notes in Computer Science, стр. 19-39. Springer, (2015)Anomaly Detection for Soft Security in Cloud based Auditing of Accounting Systems., и . CLOSER, стр. 471-478. SciTePress, (2017)The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy., и . HPCS, стр. 677-684. IEEE, (2018)Privacy and security challenges for autonomous agents : A study of two social humanoid service robots., , , и . CloudCom, стр. 230-237. IEEE, (2022)Enterprise IoT security and scalability: how unikernels can improve the status Quo., , и . UCC, стр. 292-297. ACM, (2016)Direction giving: an attempt to increase user engagement., и . ENLG, стр. 280-283. The Association for Computer Linguistics, (2011)Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis.. Cyber Security, стр. 1-5. IEEE, (2018)Compliance with standards, assurance and audit: does this equal security?, и . SIN, стр. 77. ACM, (2014)Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence., и . CyberSA, стр. 1-5. IEEE, (2020)