From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic., , и . ICNSC, стр. 374-379. IEEE, (2007)SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication., , , , , и . Pervasive Mob. Comput., (2024)Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data., , и . BTAS, стр. 1-8. IEEE, (2013)Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks., , , и . BTAS, стр. 289-296. IEEE, (2012)DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures., , , , , и . IEEE Trans. Network and Service Management, 17 (1): 201-212 (2020)SILK-TV: Secret Information Leakage from Keystroke Timing Videos., , , , , , , , , и 2 other автор(ы). ESORICS (1), том 11098 из Lecture Notes in Computer Science, стр. 263-280. Springer, (2018)On Controlling Genuine Reject Rate in Multi-stage Biometric Verification., , и . CVPR Workshops, стр. 194-199. IEEE Computer Society, (2013)PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos., , , , , , , , , и 3 other автор(ы). CoRR, (2019)Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage., , , и . CoRR, (2019)Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes., , и . CVPR Workshops, стр. 31-38. IEEE Computer Society, (2011)