Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?, , and . CoRR, (2015)Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data., , , , , , , , and . IEEE Access, (2022)Trustworthy Cross-Border Interoperable Identity System for Developing Countries., , , and . CoRR, (2023)Super forecasting the technological singularity risks from artificial intelligence., , , and . CoRR, (2023)Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store., , , and . Sensors, 22 (22): 8964 (2022)Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 321-335. Springer, (2023)Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures., , , , and . IOTSMS, page 8-14. IEEE, (2023)An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data., , and . ICNC (1), page 40-44. IEEE Computer Society, (2008)Case study: Laser nanoscale manufacturing (LaserNaMi)., , , and . HPCS, page 416. IEEE, (2012)A Novel Efficient Algorithm for Determining Maximum Common Subgraphs., and . IV, page 657-663. IEEE Computer Society, (2005)