Author of the publication

Guest editorial: A brief overview of data leakage and insider threats.

, , , and . Information Systems Frontiers, 15 (1): 1-4 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Next generation mobility management., , , and . Wireless Communications and Mobile Computing, 11 (4): 443-445 (2011)Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution., , , , , and . Mathematical and Computer Modelling, 58 (5-6): 1328-1339 (2013)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mobile Information Systems, 6 (1): 65-83 (2010)Mobile and Wireless Networks., and . Mobile Information Systems, 6 (1): 1-3 (2010)Recommendation of More Interests Based on Collaborative Filtering., , , , , , and . AINA, page 191-198. IEEE Computer Society, (2012)Information Security., and . J. UCS, 19 (16): 2347-2348 (2013)Maintaining strong consistency for the identifier-to-locator mapping cache., , , , and . GLOBECOM Workshops, page 986-991. IEEE, (2012)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)An exploration of cache collaboration in information-centric network., , , and . Int. J. Communication Systems, 27 (9): 1243-1267 (2014)Secure ubiquitous computing., , , and . Pervasive and Mobile Computing, (2015)