Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a Distributed Knowledge Discovery system for Grid systems., , and . CoRR, (2017)Effect of Security Controls on Patching Window: A Causal Inference based Approach., , and . ACSAC, page 556-566. ACM, (2020)Linking CVE's to MITRE ATT&CK Techniques., , and . ARES, page 21:1-21:12. ACM, (2021)Parallel Basic Matrix Algebra on the Grid'5000 Large Scale Distributed Platform., and . CLUSTER, IEEE Computer Society, (2006)A View of Future Technologies and Challenges for the Automation of Localisation Processes: Visions and Scenarios., , , , , , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 371-382. Springer, (2011)Towards Improving Privacy of Synthetic DataSets., , and . APF, volume 12703 of Lecture Notes in Computer Science, page 106-119. Springer, (2021)SMS Spam - A Holistic View., , , and . SECRYPT, page 221-228. SciTePress, (2014)A grid-based programming approach for distributed linear algebra applications., and . Multiagent Grid Syst., 6 (3): 209-223 (2010)On Detecting Messaging Abuse in Short Text Messages using Linguistic and Behavioral patterns., , , and . CoRR, (2014)Smartphone Security: An overview of emerging threats., , , and . IEEE Consumer Electron. Mag., 3 (4): 40-44 (2014)