From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A comparison of classifiers and features for authorship authentication of social networking messages., , , , и . Concurr. Comput. Pract. Exp., (2017)Model alignment of anthrax attack simulations., , , , и . Decis. Support Syst., 41 (3): 654-668 (2006)Characterization of defense mechanisms against distributed denial of service attacks., , и . Comput. Secur., 23 (8): 665-678 (2004)Electronic Health Record Error Prevention Approach Using Ontology in Big Data., , , и . HPCC/CSS/ICESS, стр. 752-757. IEEE, (2015)Individual Risk Perception and Choice using Cryptocurrency for Transactions., и . ICIS, Association for Information Systems, (2019)Understanding Nigerian e-mail scams: A computational content analysis approach., , , и . Inf. Secur. J. A Glob. Perspect., 30 (2): 88-99 (2021)The impact of countermeasure propagation on the prevalence of computer viruses., и . IEEE Trans. Syst. Man Cybern. Part B, 34 (2): 823-833 (2004)An Investigation of Decision-Making and the Tradeoffs involving Computer Security Risk., и . AMCIS, стр. 610. Association for Information Systems, (2009)A Hands-on Introduction to GIS with a Simple Application to Wi-Fi Security., и . AMCIS, стр. 75. Association for Information Systems, (2009)An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building., , , и . NCS, том 310 из Lecture Notes in Networks and Systems, стр. 3-12. Springer, (2021)