Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ensemble Filter for Indoor Positioning in a Retail Store Using Bluetooth Low Energy Beacons., , , and . Sensors, 19 (20): 4550 (2019)Business Process Modeling for Insider Threat Monitoring and Handling., , , and . TrustBus, volume 8647 of Lecture Notes in Computer Science, page 119-131. Springer, (2014)Transformations for FIR and IIR Filters' Design., , and . Symmetry, 13 (4): 533 (2021)An Intelligent Technique for Initial Distribution of Genetic Algorithms., , and . Axioms, 12 (10): 980 (October 2023)Introduction to Computer and Network Security: Navigating Shades of Gray., and . Comput. Secur., (2014)Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling., , , , and . UIC/ATC, page 347-354. IEEE Computer Society, (2013)Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015)., and . Comput. Secur., (2015)DiracSolver: A tool for solving the Dirac equation., , and . Comput. Phys. Commun., (2019)Proactive insider threat detection through social media: the YouTube case., , , and . WPES, page 261-266. ACM, (2013)Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module., , , and . Comput. Secur., (2017)