Search for persons
X
?
Cybersecurity Teaching in Higher Education ,
1
Using the Delphi Method to Elicit Requirements for an Inter..:
, In:
?
Threats, Countermeasures, and Advances in Applied Information Security; Advances in Information Security, Privacy, and Ethics ,
7
Analyzing Information Security Goals:
, In:
?
Proceedings of the 18th ACM international conference on Multimedia ,
8
Human animal machine interaction : animal behavior aware..:
, In:
?
Industrial Applications of Surfactants IV ,
10