Search for persons
X
?
Law, Governance and Technology Series; Legal Developments on Cybersecurity and Related Fields ,
1
Bug Bounties: Ethical and Legal Aspects:
, In:
?
2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) ,
4
Detection of Network Intrusions Using Anomaly Detection:
, In:
?
Advances in Data Mining and Database Management; Handbook of Research on Essential Information Approaches to Aiding Global Health in the One Health Context ,
5
The Syndemic and One Health Nature of Pandemics: Arguments ..:
, In:
?
2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) ,
8
Adopting Machine Learning to Support the Detection of Malic..:
, In:
?
Innovation, Engineering and Entrepreneurship; Lecture Notes in Electrical Engineering ,
9
TExtractor: An OSINT Tool to Extract and Analyse Audio/Vide..:
, In:
?
Proceedings of the 28th Annual ACM Symposium on Applied Computing ,
12
Adaptive monitoring of web-based applications : a perfor..:
, In:
?
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
13
MLPBoost: A combined AdaBoost / multi-layer perceptron netw..:
, In:
?
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
14
Combined AdaBoost and gradientfaces for face detection unde..:
, In:
?
Proceedings of the 2011 ACM Symposium on Applied Computing ,
15