Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Journalist Behind the Curtain: Participatory Functions on the Internet and their Impact on Perceptions of the Work of Journalism., and . J. Comput. Mediat. Commun., (2005)Distributed Project Governance Assessment (DPGA): Contextual, hands-on analysis for project governance across sovereign boundaries., and . SDG@ICSE, page 27-28. IEEE Computer Society, (2009)Editor's Note.. Data Sci. J., (2012)A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection., , , , , and . SSCI, page 1-7. IEEE, (2021)The Dual Descriptive and Social Norm Model To Understand 3D-Printed Clothing Adoption Intention: An Empirical Study., and . AMCIS, Association for Information Systems, (2024)Sub-Wavelength Focusing in Inhomogeneous Media with a Metasurface Near Field Plate., , , and . Sensors, 19 (20): 4534 (2019)Creating an Explainable Intrusion Detection System Using Self Organizing Maps., , , , , , and . SSCI, page 404-412. IEEE, (2022)Commercial Off-the-Shelf Product Management Lessons Learned - Satellite Ground Control System (SGCS) Upgrade., and . ICCBSS, page 206-213. IEEE Computer Society, (2006)What COTS and Software Reuse Teach Us about SOA.. ICCBSS, page 141-149. IEEE Computer Society, (2007)Designing an Artificial Immune System inspired Intrusion Detection System., , , , , , and . CoRR, (2022)