From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of heuristic based access pattern obfuscation., , , , и . CollaborateCom, стр. 537-544. ICST / IEEE, (2013)A Secure Healthcare System: From Design to Implementation., и . SCSE, том 62 из Procedia Computer Science, стр. 203-212. Elsevier, (2015)Android Trojan Horse Spyware Attack: A Practical Implementation., и . ISDFS, стр. 1-5. IEEE, (2024)Using alice in CS1: a quantitative experiment., и . ITiCSE, стр. 165-168. ACM, (2010)An Intelligent Tool to Facilitate Home Building: U-Design., , , , , и . IHSI, том 903 из Advances in Intelligent Systems and Computing, стр. 370-377. Springer, (2019)Cybersecurity Management Through Logging Analytics., , и . AHFE (9), том 593 из Advances in Intelligent Systems and Computing, стр. 3-15. Springer, (2017)Reflection of Federal Data Protection Standards on Cloud Governance., , и . CoRR, (2024)Türkçe metinlerin sıkıştırılması ve modellenmesi (Compression and modelling of Turkish texts). Ege University, Turkey, (2004)A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security., и . HICSS, стр. 2958-2968. IEEE Computer Society, (2012)Digital Image Forensics Using Hexadecimal Image Analysis., , и . AHFE (10), том 268 из Lecture Notes in Networks and Systems, стр. 176-183. Springer, (2021)