Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Literature Review on the Various Trends of Digital Forensics Usage in Combating Cybercrimes., , , , and . ICECC, page 132-138. ACM, (2023)Design of a Solar Powered IoT (Internet of Things) Remote Water Quality Management System for a Biofloc Aquaculture Technology., and . BIOTC, page 24-31. ACM, (2021)Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool., , , , and . ICICT, page 220-225. IEEE, (2023)Exploring the Attacks, Impacts, and Mitigations in a Real-Time Streaming Protocol Service of IP Cameras., , , , and . ICCTA, page 201-205. ACM, (2023)Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study., , , , , and . ICEME, page 110-117. ACM, (2023)A Case Study on Smishing: An Assessment of Threats against Mobile Devices., , , and . ICCTA, page 172-178. ACM, (2023)A Quantitative Case Study on Rampant Online Ordering Scams in the Philippines., , , and . MSIE, page 185-191. ACM, (2023)PawHub: A Web-based Telehealth Application for Companion-Animal Veterinarians' Consultation Services., , , and . ICCMS, page 78-83. ACM, (2023)Beautyhare: A Design of a Web-based Management System for Salon Services., , , and . ICCMB, page 41-47. ACM, (2024)VETGO: A Mobile Application Designed for Pet Veterinary Services., , , and . ICCMB, page 157-164. ACM, (2024)