Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity., , , and . CoRR, (2014)A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds., , , , , and . INCoS, page 480-485. IEEE, (2016)Data Collection Framework - A Flexible and Efficient Tool for Heterogeneous Data Acquisition., , , , , and . CLOSER (1), page 374-379. SciTePress, (2016)Power Grid Outlier Treatment through Kalman Filter., , , , , and . ISSRE Workshops, page 407-412. IEEE Computer Society, (2014)Direct Debit Frauds: A Novel Detection Approach., , , , , and . CLOSER (1), page 380-387. SciTePress, (2016)Efficient Supply Chain Management: Traceability and Transparency., , , and . SITIS, page 750-757. IEEE Computer Society, (2016)A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 291-301. IOS Press, (2016)Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation., , , , , and . IDC, volume 616 of Studies in Computational Intelligence, page 427-437. Springer, (2015)