Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-driven insight into the puzzle-based cybersecurity training., , and . Comput. Graph., (2022)Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training., , , , , and . IEEE Trans. Vis. Comput. Graph., 27 (8): 3425-3437 (2021)xOpat: eXplainable Open Pathology Analysis Tool., , , , , , , , , and . Comput. Graph. Forum, 42 (3): 63-73 (June 2023)CoUnSiL: A video conferencing environment for interpretation of sign language in higher education., , , , , , , and . ITHET, page 1-8. IEEE, (2016)Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training., , , , , and . CoRR, (2020)CoUnSiL: Collaborative Universe for Remote Interpreting of Sign Language in Higher Education., , , , , , , , , and 1 other author(s). ICCHP (2), volume 9759 of Lecture Notes in Computer Science, page 392-399. Springer, (2016)Geovisto: A Toolkit for Generic Geospatial Data Visualization., , and . VISIGRAPP (3: IVAPP), page 101-111. SCITEPRESS, (2021)DNS Firewall Data Visualization., , and . IM, page 743-744. IFIP, (2019)GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000., , and . MEMICS, volume 16 of OASIcs, page 77-84. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, (2010)Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences., , , , , , , , , and 10 other author(s). CHI Extended Abstracts, page 517:1-517:4. ACM, (2023)