Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Children Facial Recognition for Privacy in Smart TV., , , , , , , and . CompIMAGE, volume 10149 of Lecture Notes in Computer Science, page 229-240. (2016)Augmenting CCAM Infrastructure for Creating Smart Roads and Enabling Autonomous Driving., , , , , , and . Remote. Sens., 15 (4): 922 (February 2023)Privacy-preserving data mashup model for trading person-specific information., , , , and . Electron. Commer. Res. Appl., (2016)WhatsApp Network Forensics: Discovering the IP Addresses of Suspects., , , , and . NTMS, page 1-7. IEEE, (2021)Deepfake Audio Detection Via Feature Engineering And Machine Learning., , , , and . CIKM Workshops, volume 3318 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Multimedia File Signature Analysis for Smartphone Forensics., , , and . DeSE, page 130-137. IEEE, (2016)A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada., , , , and . AICCSA, page 1-7. IEEE Computer Society, (2019)Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches., , , , and . NTMS, page 1-6. IEEE, (2019)Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild., , , , , , , and . ARES, page 6:1-6:10. ACM, (2019)Blockchain-based chain of custody: towards real-time tamper-proof evidence management., , , and . ARES, page 48:1-48:8. ACM, (2020)