Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In-Process Monitoring of Lack of Fusion in Ultra-Thin Sheets Edge Welding Using Machine Vision., , , , , , and . Sensors, 18 (8): 2411 (2018)Online Extraction of Pose Information of 3D Zigzag-Line Welding Seams for Welding Seam Tracking., , , , , and . Sensors, 21 (2): 375 (2021)Introduction to the special issue on insider threats in cybersecurity., , , and . J. Inf. Secur. Appl., (December 2023)A Vision-Aided 3D Path Teaching Method before Narrow Butt Joint Welding., , , , , , , and . Sensors, 17 (5): 1099 (2017)Understanding cybersecurity behavioral habits: Insights from situational support., and . J. Inf. Secur. Appl., (2021)Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence., and . J. Organ. End User Comput., 33 (6): 1-17 (2021)Filter-PCA-Based Process Monitoring and Defect Identification During Climbing Helium Arc Welding Process Using DE-SVM., , , and . IEEE Trans. Ind. Electron., 70 (7): 7353-7362 (July 2023)Situational support and information security behavioural intention: a comparative study using conservation of resources theory., , and . Behav. Inf. Technol., 43 (3): 523-539 (February 2024)Collaborative linear manifold learning for link prediction in heterogeneous networks., , , , , , , , and . Inf. Sci., (2020)Organizational formalization and employee information security behavioral intentions based on an extended TPB model., and . Cyber Security, page 1-4. IEEE, (2019)