From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study on vulnerability of the Wickr login system in windows from a live forensics perspective., , , и . Comput. Secur., (2024)Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , и . Digit. Investig., (2021)Prediction of vowel identification for cochlear implant using a computational model., , , , , и . Speech Commun., (2016)Visualizing Tacit Knowledge in Cardiac Operating Room: A Need-Finding Study., , , , и . HCI (21), том 13322 из Lecture Notes in Computer Science, стр. 149-161. Springer, (2022)The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink., , , и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 951-960. Springer, (2007)Forensic analysis for multi-platform Cisco Webex., , , и . Forensic Sci. Int. Digit. Investig., (декабря 2023)Effects of Electrode Position on Spatiotemporal Auditory Nerve Fiber Responses: A 3D Computational Model Study., , , , , , и . Comput. Math. Methods Medicine, (2015)A Method for Decrypting Data Infected with Rhysida Ransomware., , , , и . CoRR, (2024)Smartphone-Based Hearing Screening in Noisy Environments., , , , , и . Sensors, 14 (6): 10346-10360 (2014)A Method for Decrypting Data Infected with Hive Ransomware., , , и . CoRR, (2022)