From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System., , и . Computer and Information Science, 3 (4): 240-251 (2010)A conceptual analysis and design of a management system for "Ifa" (an African traditional oracle)., и . Kybernetes, 38 (3/4): 625-634 (2009)Efficient n-Gram-Based String Matching in Electronic Testing at Programming., и . ICCCI, том 8083 из Lecture Notes in Computer Science, стр. 661-670. Springer, (2013)A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips., , , и . Acta Informatica Pragensia, 7 (2): 138-151 (2018)Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)., , , и . Computer and Information Science, 4 (3): 43-59 (2011)A cognitive buying decision-making process in B2B e-commerce using Analytic-MLP., , и . Electron. Commer. Res. Appl., (2017)A new two-tiered strategy to intrusion detection., , и . Inf. Manag. Comput. Secur., 12 (1): 27-44 (2004)Toward ontology-based risk management framework for software projects: An empirical study., , , , и . J. Softw. Evol. Process., (2020)TCP Window Based Congestion Control -Slow-Start Approach., , , , , и . Commun. Netw., 3 (2): 85-98 (2011)Visualizing Concurrency Control Algorithms for Real-Time Database Systems., , и . Data Sci. J., (2008)