Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UICDS compliant resource management system for emergency response., , , and . DG.O, page 23-31. Digital Government Research Center, (2010)Developing a Pedagogical Cybersecurity Ontology., and . DATA (Revised Selected Papers), volume 178 of Communications in Computer and Information Science, page 117-135. Springer, (2014)Compositional knowledge management for medical services on semantic web., , , and . WWW (Alternate Track Papers & Posters), page 498-499. ACM, (2004)Detecting and Analyzing Privacy Leaks in Tweets., , and . DATA, page 265-275. SciTePress, (2018)Big Data-based Smart City Platform: Real-Time Crime Analysis., , , and . DG.O, page 58-66. ACM, (2016)Improving Web Search Results for Homonyms by Suggesting Completions from an Ontology., , and . ICWE Workshops, volume 6385 of Lecture Notes in Computer Science, page 175-186. Springer, (2010)Data Industry and Legislations for Personal Information Protection., , and . DG.O, page 529-531. ACM, (2019)Enhancing the government service experience through QR codes on mobile platforms., , , , and . Gov. Inf. Q., 31 (1): 6-16 (2014)Optimizing data stream processing for large-scale applications., , and . Softw. Pract. Exp., 48 (9): 1607-1641 (2018)Machine Learning Approach to Detect Fake News, Misinformation in COVID-19 Pandemic., , and . DG.O, page 575-578. ACM, (2021)