From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S)., , и . SEKE, стр. 261-264. KSI Research Inc., (2021)Concept Mapping for Digital Forensic Investigations., и . IFIP Int. Conf. Digital Forensics, том 306 из IFIP Advances in Information and Communication Technology, стр. 291-300. Springer, (2009)A Discovery Learning Approach to Information Assurance Education., и . HICSS, стр. 1-9. IEEE Computer Society, (2009)A Theoretical Process Model for Smartphones., , , и . ACITY (3), том 178 из Advances in Intelligent Systems and Computing, стр. 279-290. Springer, (2012)YouTube Monetization and Censorship by Proxy: A Machine Learning Prospective., , , и . EUSPN/ICTH, том 198 из Procedia Computer Science, стр. 23-32. Elsevier, (2021)Preparing for Large-Scale Investigations with Case Domain Modeling., и . DFRWS, (2005)Experiments in hiding data inside the file structure of common office documents: a stegonography application., и . ISICT, том 90 из ACM International Conference Proceeding Series, стр. 146-151. Trinity College Dublin, (2004)Automated Merging of Software Prototypes., , и . SEKE, стр. 604-611. Knowledge Systems Institute, (1993)Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model., и . IFIP Int. Conf. Digital Forensics, том 410 из IFIP Advances in Information and Communication Technology, стр. 83-98. Springer, (2013)The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity., и . HICSS, стр. 265. IEEE Computer Society, (2007)