Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a soft skill taxonomy from job openings., , , and . Soc. Netw. Anal. Min., 9 (1): 43:1-43:19 (2019)Securing the Internet of Things (IoT)., , , and . WINCOM, page 1-6. IEEE, (2018)Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach., , , and . Soc. Netw. Anal. Min., 5 (1): 5:1-5:21 (2015)Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions., , and . SBP-BRiMS, volume 12720 of Lecture Notes in Computer Science, page 195-203. Springer, (2021)Unsupervised Skill Identification from Job Ads., , and . IRI, page 147-151. IEEE, (2021)Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time., , , , and . ANT/EDI40, volume 151 of Procedia Computer Science, page 1004-1009. Elsevier, (2019)An empirical study of global malware encounters., , and . HotSoS, page 8:1-8:11. ACM, (2015)Analysis of Hacking Related Trade in the Darkweb., , , and . ISI, page 79-84. IEEE, (2018)Privacy-Preserving Relationship Path Discovery in Social Networks., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 189-208. Springer, (2009)A Trustable Reputation Scheme Based on Private Relationships., , , , and . ASONAM, page 19-24. IEEE Computer Society, (2009)