Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lexical URL analysis for discriminating phishing and legitimate websites., , and . CEAS, page 109-115. ACM, (2011)A study of feature subset evaluators and feature subset searching methods for phishing classification., , and . CEAS, page 135-144. ACM, (2011)A Poisson reduced-rank regression model for association mapping in sequencing data., , and . BMC Bioinform., 23 (1): 529 (2022)How do you make information security user friendly?. Inf. Secur. Tech. Rep., 14 (4): 213-216 (2009)Performance geometry capture for spatially varying relighting., , , , and . SIGGRAPH Sketches, page 74. ACM, (2005)Assembling the sculptures of the Parthenon., , , , , , , , and . SIGGRAPH, ACM, (2003)Relighting human locomotion with flowed reflectance fields., , , , , , , and . SIGGRAPH Sketches, page 76. ACM, (2006)Social TV: toward content navigation using social awareness., , , and . EuroITV, page 283-292. ACM, (2010)Practical multispectral lighting reproduction., , , , , , and . ACM Trans. Graph., 35 (4): 32:1-32:11 (2016)Digital survivor of sexual assault., , , , , , , , , and . IUI, page 417-425. ACM, (2019)