From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digitized Forensic Investigation at P2P Copyright Controversy, Infringement., , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 644-646. Springer, (2006)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , и . iConference, том 12051 из Lecture Notes in Computer Science, стр. 209-219. Springer, (2020)ATM Heist Threats: A Proposed ICT Governance Strategy.. ICACT, стр. 610-615. IEEE, (2019)The Proposed PDCA Model to Counter Money Laundering., , и . KES, том 207 из Procedia Computer Science, стр. 2454-2463. Elsevier, (2022)Exploring drug-related crimes with social network analysis., , , и . KES, том 159 из Procedia Computer Science, стр. 1907-1917. Elsevier, (2019)Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet., , , , и . APSCC, стр. 1364-1368. IEEE Computer Society, (2008)The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , и . PAISI, том 10241 из Lecture Notes in Computer Science, стр. 3-14. (2017)Internet forensics on the basis of evidence gathering with Peep attacks., и . Comput. Stand. Interfaces, 29 (4): 423-429 (2007)The IP address and time in cyber-crime investigation, и . Policing: An International Journal of Police Strategies & Management, 32 (2): 194-208 (2009)Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics., , и . ICS, том 274 из Frontiers in Artificial Intelligence and Applications, стр. 904-913. IOS Press, (2014)