Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing Trust Networks Based on User Tagging Information for Recommendation Making., , , , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 357-364. Springer, (2010)Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making., , and . Web Intelligence/IAT Workshops, page 107-110. IEEE Computer Society, (2008)978-0-7695-3496-1.A Proposed PST Model for Enhancing E-Learning Experiences., , , and . ICDTE, page 44-48. ACM, (2017)RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh., , , and . IWCI, page 21-25. IEEE, (2016)e-School: Design and Implementation of Web Based Teaching Institution for Enhancing E-Learning Experiences., , and . ICCCI (1), volume 11055 of Lecture Notes in Computer Science, page 99-108. Springer, (2018)Customer Feedback Prioritization Technique: A Case Study on Lean Startup., , , , , and . ICCSA (5), volume 11623 of Lecture Notes in Computer Science, page 70-81. Springer, (2019)A Comparative Study on GA-based Scheduling on Cloud Computing., , , , and . CIIS, page 74-78. ACM, (2019)Optimal Trust Network Analysis with Subjective Logic., and . SECURWARE, page 179-184. IEEE Computer Society, (2008)Dataset of suspicious phishing URL detection., , , and . Frontiers Comput. Sci., (2024)Derivation of Design Rainfall Temporal Patterns in Australia's Gold Coast Region., , and . IKE, page 113-119. CSREA Press, (2010)