Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Antecedents and Consequences of Legitimate Corporate Participation in the DarkNet: A Preliminary Model., , , and . HICSS, page 1-10. ScholarSpace, (2021)Adapting the Ünessay" for Use in Computer Science., , , , , , , , , and . WCCCE, page 2:1-2:6. ACM, (2019)Quantifying the Financial Value of Cloud Investments: A Systematic Literature Review., , , and . CloudCom, page 194-201. IEEE Computer Society, (2017)Cross-Cultural Consensus in Personality Judgments, , ,, , , , , , and . Journal of Personality and Social Psychology, 72 (3): 558-569 (1997/3)HVA_CPS proposal: a process for hazardous vulnerability analysis in distributed cyber-physical systems., , , and . PeerJ Comput. Sci., (2023)Self-concept of Ability and Perceived Evaluation of Others: Cause or Effect of Academic Achievement?, and . Journal of Educational Psychology, 69 (2): 136--145 (1977)Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem., , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 839-848. Springer, (2019)Experimental analysis of dominance in haptic collaboration., , , , , and . RO-MAN, page 723-729. IEEE, (2009)BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem., , , , and . Future Gener. Comput. Syst., (2021)