Search for persons
X
?
2023 IEEE 5th International Conference on BioInspired Processing (BIP) ,
3
Comparative Analysis of Fungal Proteomes for Identifying Re..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
4
A Siamese Neural Network for Scalable Behavioral Biometrics..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
5
Scalable and Secure HTML5 Canvas-Based User Authentication:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
6
Centy: Scalable Server-Side Web Integrity Verification Syst..:
, In:
?
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security ,
7
Risk-based Authentication Based on Network Latency Profilin:
, In:
?
Lecture Notes in Computer Science; Pattern Recognition ,
8
Machine Learning Techniques for Identity Document Verificat..:
, In:
?
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security ,
9
SCRAP : Synthetically Composed Replay Attacks vs. Advers..:
, In:
?
Smart Innovation, Systems and Technologies; Developments and Advances in Defense and Security ,
10