From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Impact of an Integrated Approach in Disaster Management., , , , и . Int. J. Organ. Collect. Intell., 10 (2): 20-36 (2020)Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams., , , и . EANN/AIAI (2), том 364 из IFIP Advances in Information and Communication Technology, стр. 51-60. Springer, (2011)Countermeasures for timing-based side-channel attacks against shared, modern computing hardware., , , и . Int. J. Electron. Secur. Digit. Forensics, 11 (3): 294-320 (2019)Network and hypervisor-based attacks in cloud computing environments., , , , и . Int. J. Electron. Secur. Digit. Forensics, 13 (6): 630-651 (2021)Detection of sleep apnea using Machine learning algorithms based on ECG Signals: A comprehensive systematic review., , , , , , и . Expert Syst. Appl., (2022)Iris Biometrics Recognition in Security Management., , и . ES, том 10131 из Lecture Notes in Computer Science, стр. 73-96. Springer, (2015)Security and Feasibility of Power Line Communication System., , , и . ICGS3, том 534 из Communications in Computer and Information Science, стр. 244-251. Springer, (2015)Approximating non-Gaussian Bayesian networks using minimum information vine model with applications in financial modelling., , , , и . J. Comput. Sci., (2018)Challenges of Cloud Forensics., и . ES, том 10131 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2015)Philosophising Data: A Critical Reflection On The 'Hidden' Issues., , и . Int. J. Organ. Collect. Intell., 5 (1): 1-15 (2015)