From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks?, , и . CoRR, (2015)Super forecasting the technological singularity risks from artificial intelligence., , , и . CoRR, (2023)Trustworthy Cross-Border Interoperable Identity System for Developing Countries., , , и . CoRR, (2023)Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store., , , и . Sensors, 22 (22): 8964 (2022)Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures., , , , и . IOTSMS, стр. 8-14. IEEE, (2023)An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data., , и . ICNC (1), стр. 40-44. IEEE Computer Society, (2008)Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET., , , и . FIT, стр. 57-62. IEEE Computer Society, (2011)Case study: Laser nanoscale manufacturing (LaserNaMi)., , , и . HPCS, стр. 416. IEEE, (2012)Design and Development of Industrial Cyber-Physical System Testbed., , , , , и . KKA, том 1196 из Advances in Intelligent Systems and Computing, стр. 725-735. Springer, (2020)Determining Roots of Real-Valued Functions of a Single Variable over a Distributed Network., , и . PARELEC, стр. 323-329. IEEE Computer Society, (2002)