Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Serendipity for Recommender Systems: Let It Find You., , , and . ICAART (2), page 739-745. SciTePress, (2019)Modeling the Invisible Internet., and . COMPLEX NETWORKS (3), volume 1143 of Studies in Computational Intelligence, page 359-370. Springer, (2023)Cultivating Inclusivity: A Journey Towards Democratizing Cybersecurity Education., , , and . TALE, page 1-4. IEEE, (2023)Disposable identities: Solving web tracking., and . J. Inf. Secur. Appl., (2024)XorshiftH128+: A hybrid random number generator for lightweight IoT., , , , , , and . AIBThings, page 1-5. IEEE, (2023)Efficient Cluster based Routing Protocol for Collaborative Body Sensor Networks., , , , and . SENSORNETS, page 94-101. SciTePress, (2019)Application-Aware Fast Dormancy in LTE., , , , and . AINA, page 194-201. IEEE Computer Society, (2014)Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems., , , , , and . EMCIS, volume 341 of Lecture Notes in Business Information Processing, page 443-456. Springer, (2018)SCCF Parameter and Similarity Measure Optimization and Evaluation., , , , , and . KSEM (1), volume 11775 of Lecture Notes in Computer Science, page 118-127. Springer, (2019)Authentication proxy as a service.. FMEC, page 45-49. IEEE, (2017)