From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations., , и . REFSQ, том 6182 из Lecture Notes in Computer Science, стр. 255-261. Springer, (2010)Attack simulation based software protection assessment method., , , , , , и . Cyber Security And Protection Of Digital Services, стр. 1-8. IEEE, (2016)Assets focus risk management framework for critical infrastructure cybersecurity risk management., и . IET Cyper-Phys. Syst.: Theory & Appl., 4 (4): 332-340 (2019)Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system., , , , и . Neural Comput. Appl., 34 (1): 493-514 (2022)A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem., , , , и . Sensors, 23 (2): 651 (января 2023)An Intelligence Learner Management System using Learning Analytics and Machine learning., и . ICETC, стр. 120-125. ACM, (2020)Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems., и . Sensors, 22 (15): 5726 (2022)An information security risk-driven investment model for analysing human factors., , и . Inf. Comput. Secur., 24 (2): 205-227 (2016)Vulnerability prediction for secure healthcare supply chain service delivery., , , , и . Integr. Comput. Aided Eng., 29 (4): 389-409 (2022)Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology., , , , и . AIAI, том 627 из IFIP Advances in Information and Communication Technology, стр. 518-530. Springer, (2021)