Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding., , , and . AMCIS, page 503. Association for Information Systems, (2010)Redundant Reader Elimination in Large-Scale Distributed RFID Networks., , and . IEEE Internet of Things Journal, 5 (2): 884-894 (2018)Analysis of area-congestion-based DDoS attacks in ad hoc networks., , and . Ad Hoc Networks, 5 (5): 613-625 (2007)Neural network system for forecasting method selection., and . Decis. Support Syst., 12 (1): 13-24 (1994)Digital data networks design using genetic algorithms., , and . Eur. J. Oper. Res., 127 (1): 140-158 (2000)A semantic authorization model for pervasive healthcare., , and . J. Netw. Comput. Appl., (2014)Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment., , , and . IEEE Trans. Dependable Secur. Comput., 12 (4): 428-442 (2015)Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods., , , and . Decis. Sci., 32 (4): 635-660 (2001)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)A heuristic ant algorithm for solving QoS multicast routing problem., , , and . IEEE Congress on Evolutionary Computation, page 1630-1635. IEEE, (2002)