From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours., , , и . ECIS, стр. 25. (2018)An empirical evaluation of wavelets based viz-a-viz classical state-of-art to image denoising., и . IC3, стр. 331-336. IEEE, (2013)Special Issue on Connected Vehicles Guest Editorial.. IEEE Intell. Transport. Syst. Mag., 8 (3): 5-7 (2016)Metrics for characterizing the form of security policies., и . J. Strateg. Inf. Syst., 19 (4): 281-295 (2010)Guest Editors' Introduction., , , и . Inf. Syst. Frontiers, 7 (2): 111-112 (2005)Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches., и . Complex., 9 (2): 54-73 (2003)Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior., , , и . AMCIS, Association for Information Systems, (2020)Investigating syntactic and semantic inconsistencies in Collaborative Software Development., и . IC3, стр. 509-515. IEEE Computer Society, (2015)PoGest: A vision based tool for facilitating Kathak learning., и . IC3, стр. 24-29. IEEE Computer Society, (2014)LectureKhoj: Automatic tagging and semantic segmentation of online lecture videos., и . IC3, стр. 37-43. IEEE Computer Society, (2014)