From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bytecode instrumentation mechanism for monitoring mobile application information flow.. Int. J. Secur. Networks, 10 (3): 191-206 (2015)Human Factors Considerations in Mobile Learning Management Systems., , , и . IMCL, том 725 из Advances in Intelligent Systems and Computing, стр. 372-383. Springer, (2017)CUPA: A Configurable User Privacy Approach For Android Mobile Application., , и . CSCloud/EdgeCom, стр. 216-221. IEEE, (2020)Proposing New Mobile Learning (M-Learning) Adoption Model for Higher Education Providers., , , и . IMCL, том 725 von Advances in Intelligent Systems and Computing, Seite 69-76. Springer, (2017)Preserving Privacy of Integrated E-Government Information: Architecture Approach., , und . MENACOMM, Seite 1-5. IEEE, (2019)Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation., und . Int. J. Cloud Appl. Comput., 11 (2): 1-16 (2021)Development and validation of Mobile Learning Acceptance Measure., , und . Interact. Learn. Environ., 25 (7): 847-858 (2017)Neural network approach to predict mobile learning acceptance., , und . Educ. Inf. Technol., 23 (5): 1805-1824 (2018)Critical Aspects Pertaining to Privacy Preservation of IoT Architecture., und . HAISA, Seite 99-109. University of Plymouth, (2019)Runtime verification using policy-based approach to control information flow.. Int. J. Secur. Networks, 8 (4): 212-230 (2013)