From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The smuggling theory approach to organized digital crime., , и . eCrime Researchers Summit, стр. 1-7. IEEE, (2011)Low Power Integrate and Fire Circuit for Data Conversion., , и . ISCAS, стр. 2669-2672. IEEE, (2009)Decadal Urban Land Use/Land Cover Changes and Its Impact on Surface Runoff Potential for the Dhaka City and Surroundings Using Remote Sensing., , , , , , и . Remote. Sens., 13 (1): 83 (2021)Deep Reinforcement Learning-Based Traffic Light Scheduling Framework for SDN-Enabled Smart Transportation System., , , и . IEEE Trans. Intell. Transp. Syst., 23 (3): 2411-2421 (2022)Order Estimation via Matrix Completion for Multi-Switch Antenna Selection., , и . IEEE Signal Process. Lett., (2021)iRogue: Identifying Rogue Behavior from App Reviews., , , , и . CoRR, (2023)Macroeconomic Analysis of Malware., и . NDSS, The Internet Society, (2013)A Standardized Design for Sifting in Quantum Key Distribution Software., , и . GLOBECOM (Workshops), стр. 808-813. IEEE, (2022)Honor among thieves: A common's analysis of cybercrime economies., , , и . eCrime, стр. 1-11. IEEE, (2013)Pixie: Preference in Implicit and Explicit Comparisons., , , и . ACL (2), стр. 106-112. Association for Computational Linguistics, (2022)