Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-synthetic Data and Testbed for Long-Distance E-Vehicle Routing., , , , , and . ADBIS (Short Papers), volume 1450 of Communications in Computer and Information Science, page 61-71. Springer, (2021)Query Load Balancing for Incremental Visible Object Extraction., and . IDEAS, page 344-353. IEEE Computer Society, (2004)Incremental Observer Relative Data Extraction., and . BNCOD, volume 3112 of Lecture Notes in Computer Science, page 165-177. Springer, (2004)Advancing Human Performance in Cybersecurity, ADVANCES., , , and . CAiSE Research Projects Exhibition, volume 3413 of CEUR Workshop Proceedings, page 76-82. CEUR-WS.org, (2023)Human Characteristics and Genomic Factors as Behavioural Aspects for Cybersecurity., , , , and . HCI (15), volume 12776 of Lecture Notes in Computer Science, page 333-350. Springer, (2021)Digital Human in Cybersecurity Risk Assessment., , and . HCI (15), volume 12776 of Lecture Notes in Computer Science, page 418-432. Springer, (2021)3D visual data mining--goals and experiences, , , , , , and . Computational Statistics & Data Analysis, 43 (4): 445--469 (Aug 28, 2003)Challenges in Cybersecurity Group Interoperability Training., and . HCI (45), volume 1834 of Communications in Computer and Information Science, page 273-278. Springer, (2023)E-TRI: E-Vehicle Testbed Routing Infrastructure., , , , , and . SIGSPATIAL/GIS, page 71:1-71:4. ACM, (2023)A new efficient TKHC-based image sharing scheme over unsecured channel., , and . J. King Saud Univ. Comput. Inf. Sci., 34 (4): 1246-1262 (2022)