Author of the publication

Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System.

, , , , and . HICSS, page 5310-5319. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies., , , and . Int. J. Comput. Games Technol., (2011)Learning Set Representations for LWIR In-Scene Atmospheric Compensation., , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2020)Cross-Participant EEG-Based Assessment of Cognitive Workload Using Multi-Path Convolutional Recurrent Neural Networks., , , , and . Sensors, 18 (5): 1339 (2018)The Effects of Individual Differences, Non-Stationarity, and the Importance of Data Partitioning Decisions for Training and Testing of EEG Cross-Participant Models., , and . Sensors, 21 (9): 3225 (2021)The Environment Value of an Opponent Model.. IEEE Trans. Syst. Man Cybern. Part B, 40 (3): 623-633 (2010)Beyond Correlation: A Path-Invariant Measure for Seismogram Similarity., , , and . CoRR, (2019)Partially autoregressive machine learning: Development and testing of methods to predict United States Air Force retention., , , and . Comput. Ind. Eng., (2022)Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System., , , , and . HICSS, page 5310-5319. IEEE Computer Society, (2015)A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection., , and . IEEE Commun. Surv. Tutorials, 17 (1): 70-91 (2015)A Review of Anomaly Detection in Automated Surveillance., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1257-1272 (2012)