From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud., , , и . COMPSAC Workshops, стр. 212-217. IEEE Computer Society, (2013)A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint., , , и . GCCE, стр. 240-242. IEEE, (2019)Authentication method against shoulder-surfing attacks using secondary channel., и . ICCE, стр. 430-431. IEEE, (2015)Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era., , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 737-749. Springer, (2017)Risk assessment of BYOD: Bring your own device., , , , , и . GCCE, стр. 1-4. IEEE, (2016)Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach., , и . GCCE, стр. 475-477. IEEE, (2023)A Visualization Model for Silent Cyber Risks Contained in Emerging Risks., , , , и . GCCE, стр. 498-499. IEEE, (2021)Risk Assessment Quantification for Remote Learning Based on Lecture Type., , , , и . IIAI-AAI, стр. 561-567. IEEE, (2022)Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation., , , и . AINA (3), том 451 из Lecture Notes in Networks and Systems, стр. 324-333. Springer, (2022)A Study of Risk Assessment Quantification in Cloud Computing., , , , , , и . NBiS, стр. 426-431. IEEE Computer Society, (2014)