From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers., , , и . ACE, стр. 87-95. Australian Computer Society / ACM, (2013)Gender-Preferential Text Mining of E-mail Discourse., , , и . ACSAC, стр. 282-289. IEEE Computer Society, (2002)E-Mail Authorship Attribution for Computer Forensics., , , и . Applications of Data Mining in Computer Security, Springer, (2002)Detection of Anomalies from User Profiles Generated from System Logs., , и . AISC, том 116 из CRPIT, стр. 23-32. Australian Computer Society, (2011)'explain in plain english' questions revisited: data structures problems., , , , , и . SIGCSE, стр. 591-596. ACM, (2014)Mining Email Content for Author Identification Forensics., , , и . SIGMOD Record, 30 (4): 55-64 (2001)Fraud detection in ERP systems using scenario matching, , , , , , и . International Information Security Conference (SEC 2010) : Security and Privacy : Silver Linings in the Cloud, стр. 112--123. Brisbane Convention & Exhibition Centre, Brisbane, Queensland, Springer, (сентября 2010)Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer..