Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships., , , and . ICIS, page 74. Association for Information Systems, (2009)iPhish: Phishing Vulnerabilities on Consumer Electronics., , and . UPSEC, USENIX Association, (2008)Five Years of the Right to be Forgotten., , , , , , , , , and 10 other author(s). ACM Conference on Computer and Communications Security, page 959-972. ACM, (2019)Message Passing Algorithm for GFDM-IM Detection., and . DSP, page 1-5. IEEE, (2018)A Quantitative Study of Forum Spamming Using Context-based Analysis., , , , and . NDSS, The Internet Society, (2007)Spam double-funnel: connecting web spammers with advertisers., , , and . WWW, page 291-300. ACM, (2007)Research on PCB Defect Detection Algorithm Based on Improved YOLOv5., , and . RICAI, page 1220-1224. ACM, (2022)Dynamic Pricing for Autonomous Vehicle E-hailing Services Reliability and Performance Improvement., , , , , and . CASE, page 948-953. IEEE, (2019)Information Technology Portfolio Management: Literature Review, Framework, and Research Issues., , and . IRMJ, 21 (3): 64-87 (2008)The Effect of Task Type and Information Format on Web Searching Performance., and . ICIS, page 52. Association for Information Systems, (2006)