From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey., , и . pHealth, том 261 из Studies in Health Technology and Informatics, стр. 239-245. IOS Press, (2019)What Make You Sure that Health Informatics Is Secure.. ICOST, том 9677 из Lecture Notes in Computer Science, стр. 443-448. Springer, (2016)A Secure Steganography Method based on Genetic Algorithm., , и . J. Inf. Hiding Multim. Signal Process., 1 (1): 28-35 (2010)Privacy-preserving continuous authentication using behavioral biometrics., , и . Int. J. Inf. Sec., 22 (6): 1833-1847 (декабря 2023)Erasable Photograph Tagging: A Mobile Application Framework Employing Owner's Voice., , , , и . IEICE Trans. Inf. Syst., 97-D (2): 370-372 (2014)Evaluation method for pedestrian level of service on sidewalks based on fuzzy neural network model., , , , и . J. Intell. Fuzzy Syst., 30 (5): 2905-2913 (2016)Investigation into Phishing Risk Behaviour among Healthcare Staff., , , и . Inf., 13 (8): 392 (2022)IRL-Net: Inpainted Region Localization Network via Spatial Attention., , , , , и . IEEE Access, (2023)Towards an Operable Evaluation System for Evidence of Identity., и . COMPSAC (2), стр. 565-570. IEEE Computer Society, (2018)978-1-5386-2667-2.Transparent and perceptually enhanced JPEG image encryption., , , и . DPS, стр. 1-6. IEEE, (2009)