Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Viewing Cybercommunities through the Lens of Modernity: The Case of Second Life., , and . IJVCSN, 5 (1): 75-90 (2013)Web Filtering and Censoring., and . Computer, 43 (3): 94-97 (2010)Low power ADC's for wireless communications., , , , , and . MWSCAS, page 694-697. IEEE, (2012)From feeling like rape to a minor inconvenience: Victims' accounts of the impact of computer misuse crime in the United Kingdom., , , , , and . Telematics Informatics, (2021)Monitoring and Intervention: Concepts and Formal Models., , and . CoRR, (2017)Comprehensive genomic characterization defines human glioblastoma genes and core pathways, , , , , , , , , and 222 other author(s). Nature, (September 2008)Surveillance and identity: conceptual framework and formal models., and . J. Cybersecur., 3 (3): 145-158 (2017)Exploring the extent of openness of open government data - A critique of open government datasets in the UK., and . Gov. Inf. Q., (2020)Blockchain Technology in Current Agricultural Systems: From Techniques to Applications., , , , , , , , and . IEEE Access, (2020)Industrial espionage - A systematic literature review (SLR)., and . Comput. Secur., (2020)