Author of the publication

Mobile crowd sensing of human-like intelligence using social sensors: A survey.

, , , , , , and . Neurocomputing, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital droplets: Microsoft SkyDrive forensic data remnants., and . Future Generation Comp. Syst., 29 (6): 1378-1394 (2013)The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols., , and . Computer Communications, 29 (15): 2788-2797 (2006)A survey of information security incident handling in the cloud., and . Computers & Security, (2015)Dropbox analysis: Data remnants on user machines., and . Digital Investigation, 10 (1): 3-18 (2013)Cloud storage forensics: ownCloud as a case study., and . Digital Investigation, 10 (4): 287-299 (2013)Complementing Computational Protocol Analysis with Formal Specifications., , , and . Formal Aspects in Security and Trust, volume 173 of IFIP, page 129-144. Springer, (2004)Data Recovery from Proprietary Formatted Cctv Hard Disks., , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 213-223. Springer, (2013)Building the Next Generation of Cyber Security Professionals., and . ECIS, (2014)User profiling in intrusion detection: A review., , and . J. Network and Computer Applications, (2016)Multi-sender Broadcast Authentication in Wireless Sensor Networks., , and . CIS, page 633-637. IEEE Computer Society, (2014)