Search for persons
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
1
A Siamese Neural Network for Scalable Behavioral Biometrics..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
2
Scalable and Secure HTML5 Canvas-Based User Authentication:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
3
Centy: Scalable Server-Side Web Integrity Verification Syst..:
, In:
?
Lecture Notes in Computer Science; Pattern Recognition ,
4
Machine Learning Techniques for Identity Document Verificat..:
, In:
?
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security ,
5
Risk-based Authentication Based on Network Latency Profilin:
, In:
?
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security ,
6
SCRAP : Synthetically Composed Replay Attacks vs. Advers..:
, In:
?
Applied Environmental Science and Engineering for a Sustainable Future; Renewable Energy Technologies for Energy Efficient Sustainable Development ,
7
Food Waste Biorefinery for Bioenergy and Value Added Produc..:
, In:
?
2022 IEEE Global Humanitarian Technology Conference (GHTC) ,
9
Implementation of the STEAM Method to motivate and inspire ..:
, In:
?
2023 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS) ,
10
Towards a Sr Optical Lattice Clock at ROA : First implement..:
, In:
?
ACM SIGGRAPH 2020 Real-Time Live! ,
11
Chroma tools : AI-enhanced storytelling for motor racing..:
, In:
?
Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks ,
12
Analyzing the behavior of acoustic link models in underwate..:
, In:
?
Neural Engineering Techniques for Autism Spectrum Disorder, Volume 2 ,
14
List of contributors:
, In:
?
Physical Virology; Springer Series in Biophysics ,
15