Personensuche
X
?
Security and Trust Management; Lecture Notes in Computer Science ,
1
HoneyGAN: Creating Indistinguishable Honeywords with Improv..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Wireless Mobile Communication and Healthcare ,
2
Artificial Empathy for Clinical Companion Robots with Priva..:
, In:
?
2019 IEEE International Conference on Cognitive Computing (ICCC) ,
3
Using EEG to Predict and Analyze Password Memorability:
, In:
?
Advances in Intelligent Systems and Computing; Advances in Emerging Trends and Technologies ,
4
Mapping of the Transportation System of the City of Aguasca..:
, In:
?
2010 2nd International Conference on Software Technology and Engineering ,
7
Use processes — modeling requirements based on elements of ..:
, In:
?
2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT) ,
8
Beyond Chunking: Re-Engineering Password Segmentation for B..:
, In:
?
2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT) ,
9
How Password Strength Becomes a Weak Link for Honeywords:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
10
Honey, I Chunked the Passwords: Generating Semantic Honeywo..:
, In:
?
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
11
GNPassGAN: Improved Generative Adversarial Networks For Tra..:
, In:
?
Document Analysis and Recognition – ICDAR 2021; Lecture Notes in Computer Science ,
13
A More Effective Sentence-Wise Text Segmentation Approach U..:
, In:
?
2019 17th International Conference on Privacy, Security and Trust (PST) ,
15