Personensuche
X
?
Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science ,
1
Detecting Machine-Translated Paragraphs by Matching Similar..:
, In:
?
Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics ,
3
Enhancing Boundary Attack in Adversarial Image Using Square..:
, In:
?
Advanced Information Networking and Applications; Lecture Notes in Networks and Systems ,
5
Lifestyle Authentication Using a Correlation Between Activi..:
, In:
?
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) ,
7
Effective Classification for Multi-modal Behavioral Authent..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
8
GPS-Based Behavioral Authentication Utilizing Distance Cohe..:
, In:
?
Data and Applications Security and Privacy XXXIV; Lecture Notes in Computer Science ,
9
Self-enhancing GPS-Based Authentication Using Corresponding..:
, In:
?
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
10
Enhancing A New Classification for IDN Homograph Attack Det..:
, In:
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
11
Detecting Malicious Websites by Query Templates:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
12
Human Factors in Homograph Attack Recognition:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
13
Hunting Brand Domain Forgery: A Scalable Classification for..:
, In:
?
Proceedings of the 32nd Annual Conference on Computer Security Applications ,
15