Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Perspectives in Systems Development., , , and . AMCIS, page 273. Association for Information Systems, (2007)Steganography: Forensic, Security, and Legal Issues., , and . J. Digit. Forensics Secur. Law, 3 (2): 17-34 (2008)MDFC-ResNet: An Agricultural IoT System to Accurately Recognize Crop Diseases., , , , , and . IEEE Access, (2020)Trust in videoconferencing., and . Commun. ACM, 49 (7): 103-107 (2006)Analysis of systems development project risks: an integrative framework., , , and . DATA BASE, 40 (2): 8-27 (2009)Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents., , , , and . Sensors, 17 (11): 2523 (2017)Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security., , and . J. Organ. End User Comput., 16 (3): 41-58 (2004)An Empirical Assessment of Technology Adoption as a Choice between Alternatives., , , and . Inf. Resour. Manag. J., 22 (4): 23-44 (2009)Digital Steganography - An Introduction to Techniques and Tools., , , and . Commun. Assoc. Inf. Syst., (2012)Aspect Based Hierarchical System: A Fine-grained Sentiment Analysis System in Edge Computing., , , , , , and . ICPS, page 731-736. IEEE, (2019)