Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Solutions For Format-Preserving Encryption., , and . CoRR, (2015)Method for Detecting Unknown Malicious Executables., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 376-377. Springer, (2009)Association rules mining in vertically partitioned databases., and . Data Knowl. Eng., 59 (2): 378-396 (2006)SoK: Cryptography for Neural Networks., , , , , , , , , and 3 other author(s). Privacy and Identity Management, volume 576 of IFIP Advances in Information and Communication Technology, page 63-81. Springer, (2019)SISR - A New Model for Epidemic Spreading of Electronic Threats., , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 242-249. Springer, (2009)Mining Roles from Web Application Usage Patterns., , , , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 125-137. Springer, (2011)Unleashing the Potential of Data Lakes with Semantic Enrichment Using Foundation Models., , , , , , , , , and 7 other author(s). ISWC (Posters/Demos/Industry), volume 3632 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Tracking end-users in web databases., , , , and . NSS, page 105-112. IEEE, (2011)Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases., and . DBSec, volume 142 of IFIP, page 91-104. Kluwer/Springer, (2003)A Method for Detecting Unknown Malicious Executables., , , and . TrustCom, page 190-196. IEEE Computer Society, (2011)