Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , and . ICACT, page 35-41. IEEE, (2022)The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , and . ICACT, page 35-41. IEEE, (2021)Noise control in document classification based on fuzzy formal concept analysis., and . FUZZ-IEEE, page 2583-2588. IEEE, (2011)Exploring drug-related crimes with social network analysis., , , and . KES, volume 159 of Procedia Computer Science, page 1907-1917. Elsevier, (2019)Heuristic-Based Approach for Constructing Hierarchical Knowledge Structures., , , and . IEA/AIE, volume 5579 of Lecture Notes in Computer Science, page 439-448. Springer, (2009)Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations., , and . ICACT, page 1108-1115. IEEE, (2019)Tool Mark Identification of Skype Traffic., , and . ICACT, page 361-366. IEEE, (2020)A Systematic Review of Detecting Illicit Bitcoin Transactions., , and . KES, volume 207 of Procedia Computer Science, page 3217-3225. Elsevier, (2022)A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework., and . KES, volume 207 of Procedia Computer Science, page 3635-3644. Elsevier, (2022)A Knowledge Discovery Approach to Supporting Crime Prevention., , , and . JCIS, Atlantis Press, (2006)