Author of the publication

Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review.

, , and . Comput., 10 (10): 121 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on "performance evaluation, modeling and analysis of wireless Ad-Hoc networks"., , and . Ad Hoc Networks, (2021)Efficient deployment of gateways in multi-hop ad-hoc wireless networks., , , , , and . PE-WASUN, page 93-100. ACM, (2014)MAX-MIN based buffer allocation for VANETs., , , , , and . WiVeC, page 1-5. IEEE, (2014)Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey., , and . CSNet, page 122-129. IEEE, (2019)A comparison of vehicle emissions control strategies for smart cities., , , and . PeerJ Comput. Sci., (2023)Linkage of IoT Technologies with the SWE (SOS) Standard for the Development of a Heterogeneous Intelligent Transport System (Case Study Quito)., , , , and . Nets4Cars/Nets4Trains/Nets4Aircraft, volume 11461 of Lecture Notes in Computer Science, page 60-69. Springer, (2019)A Stochastic Optimization Model for the Placement of Road Site Units., , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 263-269. (2015)Session details: Mesh and Ubiquitous Networks.. PE-WASUN, ACM, (2019)A Simple Approximation for the Sum of Fading Random Variables via a Nakagami-m Distribution., , , and . VTC Fall, page 1-7. IEEE, (2019)VTM: Vehicular Traffic Monitor via Images Processing of GoogleMaps., , , , and . PE-WASUN, page 40-46. ACM, (2018)