Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Big Data Technologies and Applications ,
1
An Auditable Framework for Evidence Sharing and Management ..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Big Data Technologies and Applications ,
2
A Bibliometric Analysis and Systematic Review of a Blockcha..:
, In:
?
2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
3
Enhancing Mac OS Malware Detection through Machine Learning..:
, In:
?
2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) ,
4
Forensic Considerations for the High Efficiency Image File ..:
, In:
?
Advances in Intelligent Systems and Computing; Intelligent Computing ,
5
5G-FOG: Freezing of Gait Identification in Multi-class Soft..:
, In:
?
2020 International Joint Conference on Neural Networks (IJCNN) ,
6
Real-time anomaly intrusion detection for a clean water sup..:
, In:
?
Communications in Computer and Information Science; Technology Trends ,
7
Implementation and Detection of Novel Attacks to the PLC Me..:
, In:
?
Proceedings of the 10th International Conference on Security of Information and Networks ,
8
Insider threat detection using principal component analysis..:
, In:
?
Proceedings of the 2008 international workshop on System level interconnect prediction ,
9