From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity management systems: Laws of identity for models7 evaluation., , , и . CIST, стр. 736-740. IEEE, (2016)Software Project Management in the Era of Digital Transformation., , и . NETYS, том 10299 из Lecture Notes in Computer Science, стр. 391-395. (2017)The Security of Web Services: Secure Communication and Identity Management., , и . BDCA, том 1580 из CEUR Workshop Proceedings, стр. 56-60. CEUR-WS.org, (2015)Adoption of advanced technologies in industrial companies: A bibliometric analysis., , , , и . NISS, стр. 65:1-65:5. ACM, (2023)Data mining techniques for employability: Systematic literature review., , и . ICECOCS, стр. 1-5. IEEE, (2020)Exploiting Open Data to Improve the Business Intelligence & Business Discovery Experience., , , и . BDCA, стр. 27:1-27:6. ACM, (2017)Handwriting Recognition with Artificial Neural Networks a Decade Literature Review., , , и . NISS, стр. 65:1-65:5. ACM, (2020)Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning., , , , и . Int. J. Inf. Sec., 23 (2): 1359-1388 (апреля 2024)A security approach for social networks based on honeypots., , и . CIST, стр. 638-643. IEEE, (2016)Intelligent Decision Making for Depression Prevention and Detection based on AHP., , и . NISS, стр. 34:1-34:7. ACM, (2019)