From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Steganographic Transports: A Vector for Hidden Secret Internets?, и . TrustCom/BigDataSE, стр. 891-896. IEEE, (2018)Editorial for FGCS special issue: Big Data in the cloud., , , , , и . Future Gener. Comput. Syst., (2016)A Comparative Analysis of Distributed Ledger Technology Platforms., , , , , , и . IEEE Access, (2019)Privacy-preserving cooperative localization in vehicular edge computing infrastructure., , , , , , , и . Concurr. Comput. Pract. Exp., (2022)Why do users trust the wrong messages? A behavioural model of phishing.. eCrime, стр. 1-7. IEEE, (2009)Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand., , и . HICSS, стр. 1742-1749. IEEE Computer Society, (2015)Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation., , , , , , и . Comput. Secur., (ноября 2023)The Inadequacy of Entropy-Based Ransomware Detection., , , и . ICONIP (5), том 1143 из Communications in Computer and Information Science, стр. 181-189. Springer, (2019)Responsibility Attribution Against Data Breaches., , , , , , и . ICIoT, стр. 498-503. IEEE, (2020)Significance of Phonological Features in Speech Emotion Recognition., , , , и . Int. J. Speech Technol., 23 (3): 633-642 (2020)