From post

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.

, , и . ICT-EurAsia, том 7804 из Lecture Notes in Computer Science, стр. 253-260. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Multiple-Key Management Scheme in Wireless Sensor Networks., , , , , , и . CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 337-344. Springer, (2013)A Structure P2P Based Web Services Registry with Access and Control., , , , и . CD-ARES, том 8708 из Lecture Notes in Computer Science, стр. 286-297. Springer, (2014)Security of 5G-V2X: Technologies, Standardization and Research Directions., , и . CoRR, (2019)A Design of Web Log Integration Framework Using NoSQL., , , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 438-445. Springer, (2014)Editorial.. JoWUA, 1 (1): 1-2 (2010)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , и . INFOCOM Workshops, стр. 970-975. IEEE, (2016)Prosperity of IT security technologies in homeland defense., , и . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , и . IMIS, стр. 287-290. IEEE Computer Society, (2014)Trustworthy Opportunistic Access to the Internet of Services., , , , , , и . ICT-EurAsia, том 7804 из Lecture Notes in Computer Science, стр. 469-478. Springer, (2013)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , и . IMIS, стр. 595-600. IEEE Computer Society, (2013)