From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Threat Vectors in ICS Cyberattacks., и . IEEE Big Data, стр. 1368-1373. IEEE, (2023)Public Health Units - Exploratory Analysis for Decision Support., , , и . ADBIS (Short Papers), том 1450 из Communications in Computer and Information Science, стр. 133-138. Springer, (2021)Cyber-infrastructure support for the integration and analysis of student success data., , и . FIE, стр. 1-5. IEEE Computer Society, (2015)Recommendation based on Deduced Social Networks in an educational digital library., , , и . JCDL, стр. 29-38. IEEE Computer Society, (2014)Digital Library 2.0 for Educational Resources., , , , , , , , , и 4 other автор(ы). TPDL, том 6966 из Lecture Notes in Computer Science, стр. 89-100. Springer, (2011)Human Mobility Driven Modeling of an Infectious Disease., , и . ICDM (Workshops), стр. 1189-1196. IEEE, (2022)How educators find educational resources online., , , , , , и . ITiCSE, стр. 367. ACM, (2011)Analyzing Evolving Trends of Vulnerabilities in National Vulnerability Database., , , , , и . IEEE BigData, стр. 3011-3020. IEEE, (2018)On Using Disparate Scholarly Data to Identify Potential Members for Interdisciplinary Research Groups., , и . IRI, стр. 59-68. IEEE Computer Society, (2017)Ensemble PDP-8: eight principles for distributed portals, , , , , , , , , и 4 other автор(ы). JCDL '10: Proceedings of the 10th annual joint conference on Digital libraries, стр. 341--344. New York, NY, USA, ACM, (2010)