From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Planning Security Policy on E-Commerce., , , и . ICEIS (2), стр. 915-919. (2001)A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot., , , , и . QRS Companion, стр. 633-634. IEEE, (2018)A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices., , , , и . Entropy, 21 (12): 1136 (2019)Visualizing Classification Results: Confusion Star and Confusion Gear., , , и . IEEE Access, (2022)Improving Classification Algorithms by Considering Score Series in Wireless Acoustic Sensor Networks., , , и . Sensors, 18 (8): 2465 (2018)Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction., , , и . ICEIS (2), стр. 130-137. (2009)Model of Knowledge Spreading for Multi-agent Systems., , , , , и . ICEIS (2), стр. 326-331. SciTePress, (2010)Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems., , , , и . ICEIS, том 24 из Lecture Notes in Business Information Processing, стр. 737-744. Springer, (2009)A Fuzzy Logic intelligent agent for Information Extraction: Introducing a new Fuzzy Logic-based term weighting scheme., , , и . Expert Syst. Appl., 39 (4): 4567-4581 (2012)Information Systems for Improving Competition in Deregulated Electricity Market., , и . ICEIS, стр. 402-406. (2000)