Author of the publication

A Holistic Approach for Managing Spyware.

. Inf. Secur. J. A Glob. Perspect., 15 (2): 42-48 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Subpixel Surface Water Mapping from Heterogeneous Urban Environments Using Landsat 8 OLI Imagery., , , , and . Remote Sensing, 8 (7): 584 (2016)Adaptive Mobility Mapping for People Tracking Using Unlabelled Wi-Fi Shotgun Reads., , , , , and . IEEE Communications Letters, 17 (1): 87-90 (2013)Class consistent hashing for fast Web data searching., , , and . World Wide Web, 22 (2): 477-497 (2019)What do we know about biometrics authentication?, and . InfoSecCD, page 31:1-31:5. ACM, (2007)The value of backers' word-of-mouth in crowdfunding projects filtering: an empirical investigation., , , , and . Electron. Commer. Res., 20 (4): 757-782 (2020)Optimized Sample Selection in SVM Classification by Combining with DMSP-OLS, Landsat NDVI and GlobeLand30 Products for Extracting Urban Built-Up Areas., , , , , and . Remote. Sens., 9 (3): 236 (2017)Simulating Future LUCC by Coupling Climate Change and Human Effects Based on Multi-Phase Remote Sensing Data., , , , , , , and . Remote. Sens., 14 (7): 1698 (2022)A Holistic Approach for Managing Spyware.. Inf. Secur. J. A Glob. Perspect., 15 (2): 42-48 (2006)A non-Markovian stochastic Petri net-based approach to performance evaluation of ontology-based service composition., , , , and . Concurr. Comput. Pract. Exp., 24 (18): 2255-2267 (2012)Video Captioning by Learning from Global Sentence and Looking Ahead., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (5s): 171:1-171:20 (2023)