From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , и . PAISI, том 10241 из Lecture Notes in Computer Science, стр. 3-14. (2017)Internet forensics on the basis of evidence gathering with Peep attacks., и . Comput. Stand. Interfaces, 29 (4): 423-429 (2007)Digitized Forensic Investigation at P2P Copyright Controversy, Infringement., , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 644-646. Springer, (2006)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , и . iConference, том 12051 из Lecture Notes in Computer Science, стр. 209-219. Springer, (2020)Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet., , , , и . APSCC, стр. 1364-1368. IEEE Computer Society, (2008)The Proposed PDCA Model to Counter Money Laundering., , и . KES, том 207 из Procedia Computer Science, стр. 2454-2463. Elsevier, (2022)ATM Heist Threats: A Proposed ICT Governance Strategy.. ICACT, стр. 610-615. IEEE, (2019)Exploring drug-related crimes with social network analysis., , , и . KES, том 159 из Procedia Computer Science, стр. 1907-1917. Elsevier, (2019)Cybercrime Countermeasure of Insider Threat Investigation.. ICACT, стр. 413-418. IEEE, (2019)The Governance of Digital Forensic Investigation in Law Enforcement Agencies., , и . ICACT, стр. 61-65. IEEE, (2019)