From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Design Patterns in the MASTER Workbench., , и . Cyberpatterns, Springer, (2014)Verified Firewall Policy Transformations for Test Case Generation., , , и . ICST, стр. 345-354. IEEE Computer Society, (2010)An approach to modular and testable security models of real-world health-care applications., , , и . SACMAT, стр. 133-142. ACM, (2011)What's so Unique about Cyber Security?, , и . CSP Forum, том 530 из Communications in Computer and Information Science, стр. 131-139. Springer, (2015)