Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data., , , , , , , , and . IEEE Access, (2022)Super forecasting the technological singularity risks from artificial intelligence., , , and . CoRR, (2023)Trustworthy Cross-Border Interoperable Identity System for Developing Countries., , , and . CoRR, (2023)Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?, , and . CoRR, (2015)Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 321-335. Springer, (2023)Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store., , , and . Sensors, 22 (22): 8964 (2022)An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data., , and . ICNC (1), page 40-44. IEEE Computer Society, (2008)Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures., , , , and . IOTSMS, page 8-14. IEEE, (2023)Case study: Laser nanoscale manufacturing (LaserNaMi)., , , and . HPCS, page 416. IEEE, (2012)A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual Organsations., , and . AINA Workshops, page 1114-1120. IEEE Computer Society, (2010)