Author of the publication

Dual-sensor camera for acquiring image sequences with different spatio-temporal resolution.

, , , , , and . AVSS, page 450-455. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of the Effectiveness to Monitor Darknet across Multiple Organizations., , , , , , , , , and . CANDAR (Workshops), page 346-351. IEEE, (2021)Dual-sensor camera for acquiring image sequences with different spatio-temporal resolution., , , , , and . AVSS, page 450-455. IEEE Computer Society, (2005)Continuous and Multiregional Monitoring of Malicious Hosts., , , , , , , and . ACM Conference on Computer and Communications Security, page 2101-2103. ACM, (2020)HOUND: Log Analysis Support for Threat Hunting by Log Visualization., , , and . IIAI-AAI, page 653-656. IEEE, (2022)Development of White List Based Autonomous Evolution of Defense System for RAT Malware., , , , , , and . AsiaJCIS, page 95-101. IEEE Computer Society, (2018)CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs., , , and . IWSEC, volume 13504 of Lecture Notes in Computer Science, page 85-104. Springer, (2022)Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results., , , , , , , , and . NBiS, page 135-139. IEEE Computer Society, (2016)