Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Methods and Approaches of Explainable Artificial Intelligence., , , and . ICCS (4), volume 12745 of Lecture Notes in Computer Science, page 3-17. Springer, (2021)How Explainable Is Explainability? Towards Better Metrics for Explainable AI., , , , and . RIIFORUM, page 685-695. Springer, (2023)The cybersecurity-related ethical issues of cloud technology and how to avoid them., , , , and . ARES, page 56:1-56:7. ACM, (2022)How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes., , , and . CISIM, volume 14164 of Lecture Notes in Computer Science, page 283-297. Springer, (2023)Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models., , , , , and . DSAA, page 1-9. IEEE, (2023)The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good., , and . Pers. Ubiquitous Comput., 25 (5): 843-852 (2021)First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions., , , and . Pers. Ubiquitous Comput., 27 (2): 193-202 (April 2023)Deep Learning for Combating Misinformation in Multicategorical Text Contents., , , , , and . Sensors, 23 (24): 9666 (December 2023)Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation., , , and . ISD, Risoprint / Association for Information Systems, (2022)Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems., , , , and . CORES/IP&C, volume 766 of Lecture Notes in Networks and Systems, page 45-53. Springer, (2023)