Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The smuggling theory approach to organized digital crime., , and . eCrime Researchers Summit, page 1-7. IEEE, (2011)Low Power Integrate and Fire Circuit for Data Conversion., , and . ISCAS, page 2669-2672. IEEE, (2009)Decadal Urban Land Use/Land Cover Changes and Its Impact on Surface Runoff Potential for the Dhaka City and Surroundings Using Remote Sensing., , , , , , and . Remote. Sens., 13 (1): 83 (2021)Deep Reinforcement Learning-Based Traffic Light Scheduling Framework for SDN-Enabled Smart Transportation System., , , and . IEEE Trans. Intell. Transp. Syst., 23 (3): 2411-2421 (2022)Order Estimation via Matrix Completion for Multi-Switch Antenna Selection., , and . IEEE Signal Process. Lett., (2021)iRogue: Identifying Rogue Behavior from App Reviews., , , , and . CoRR, (2023)Macroeconomic Analysis of Malware., and . NDSS, The Internet Society, (2013)A Standardized Design for Sifting in Quantum Key Distribution Software., , and . GLOBECOM (Workshops), page 808-813. IEEE, (2022)Honor among thieves: A common's analysis of cybercrime economies., , , and . eCrime, page 1-11. IEEE, (2013)Pixie: Preference in Implicit and Explicit Comparisons., , , and . ACL (2), page 106-112. Association for Computational Linguistics, (2022)