From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The role of mobile forensics in terrorism investigations involving the use of cloud apps., , , , и . MobiMedia, стр. 199-204. ACM, (2016)Exploiting Lists of Names for Named Entity Identification of Financial Institutions from Unstructured Documents., , и . CoRR, (2016)Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications., , , и . Wireless Personal Communications, 95 (3): 1855-1857 (2017)Comparison between frequency splitting approach and fuzzy logic control as an energy control strategy in hybrid vehicles., , и . ICCAIS, стр. 372-377. IEEE, (2015)Group-driven Reinforcement Learning for Personalized mHealth Intervention., , , , и . CoRR, (2017)Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing., , , , и . CoRR, (2018)An optimized approach for massive web page classification using entity similarity based on semantic network., , , , и . Future Gener. Comput. Syst., (2017)Discovering the core semantics of event from social media., , , , , и . Future Gener. Comput. Syst., (2016)Slime Mold optimization with hybrid deep learning enabled crowd-counting approach in video surveillance., , , , , и . Neural Comput. Appl., 36 (5): 2215-2229 (февраля 2024)Editorial: Special issue on neural computing and applications in cyber intelligence: ATCI 2020., и . Neural Comput. Appl., 33 (3): 805-806 (2021)