Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Note: Learn Online: High School Students' Adoption of Online Learning in Bangladesh during COVID-19 Pandemic., , and . COMPASS, page 603-607. ACM, (2022)An Empirical Study of Developer Discussions on Low-Code Software Development Challenges., , , , , and . MSR, page 46-57. IEEE, (2021)AISec'20: 13th Workshop on Artificial Intelligence and Security., , and . CCS, page 2143-2144. ACM, (2020)LexOnt: A Semi-Automatic Ontology Creation Tool for Programmable Web., , and . AAAI Spring Symposium: Intelligent Web Services Meet Social Computing, volume SS-12-04 of AAAI Technical Report, AAAI, (2012)Explaining Website Reliability by Visualizing Hyperlink Connectivity., , , , , , , and . IEEE VIS (Short Papers), page 26-30. IEEE, (2022)AISec'19: 12th ACM Workshop on Artificial Intelligence and Security., , , , and . CCS, page 2707-2708. ACM, (2019)A Hiring Story: Experiences of Employers in Hiring CS Graduates in Software Startups., , , and . CSCW Companion, page 126-129. ACM, (2022)Ä Tale on Abuse and Its Detection over Online Platforms, Especially over Emails": From the Context of Bangladesh., , , , , and . NSysS, page 19-28. ACM, (2021)Characterizing the Nature and Dynamics of Tor Exit Blocking., , , , , , and . ANRW, page 23. ACM, (2018)Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains., , , , and . eCrime, page 1-16. IEEE, (2019)