Author of the publication

Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data.

, , , and . ICITST, page 414-419. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating Trusted Records for Employment and Education., , and . IoTBDS, page 412-419. SCITEPRESS, (2020)Preventing document leakage through active document., , , and . WorldCIS, page 53-58. IEEE, (2014)Component for 3D printing provenance framework: Security properties components for provenance framework., , , and . WorldCIS, page 91-96. IEEE, (2014)Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model., , and . Sensors, 22 (5): 2005 (2022)Towards a Framework for Securing a Document outside an Organisational Firewall., , , , and . CloudCom, page 1057-1062. IEEE Computer Society, (2014)The Effectiveness of Transformer-Based Models for BEC Attack Detection., , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 77-90. Springer, (2023)Approaches to maintaining provenance throughout the additive manufacturing process., , and . WorldCIS, page 82-87. IEEE, (2013)Identifying Food Fraud using Blockchain., , and . IoTBDS, page 185-192. SCITEPRESS, (2021)Malicious Activity Detection using Smart Contracts in IoT., , and . IoTBDS, page 286-295. SCITEPRESS, (2021)Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data., , , and . ICITST, page 414-419. IEEE, (2014)