From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , и . PAISI, том 10241 из Lecture Notes in Computer Science, стр. 3-14. (2017)ATM Heist Threats: A Proposed ICT Governance Strategy.. ICACT, стр. 610-615. IEEE, (2019)Internet forensics on the basis of evidence gathering with Peep attacks., и . Comput. Stand. Interfaces, 29 (4): 423-429 (2007)Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models., , и . Comput. Stand. Interfaces, 31 (4): 795-800 (2009)Digitized Forensic Investigation at P2P Copyright Controversy, Infringement., , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 644-646. Springer, (2006)Exploring drug-related crimes with social network analysis., , , и . KES, том 159 из Procedia Computer Science, стр. 1907-1917. Elsevier, (2019)The Proposed PDCA Model to Counter Money Laundering., , и . KES, том 207 из Procedia Computer Science, стр. 2454-2463. Elsevier, (2022)Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet., , , , и . APSCC, стр. 1364-1368. IEEE Computer Society, (2008)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , и . iConference, том 12051 из Lecture Notes in Computer Science, стр. 209-219. Springer, (2020)Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach., , , , и . Digit. Investig., (2020)