Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Phase Transition of Finding a Biclique in a larger Bipartite Graph., , and . CoRR, (2016)FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness., , , , and . IEEE Trans. Affect. Comput., 9 (3): 372-382 (2018)An Approach Based on Contrast Patterns for Bot Detection on Web Log Files., , , , and . MICAI (1), volume 11288 of Lecture Notes in Computer Science, page 276-285. Springer, (2018)On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks., , , and . Sensors, 15 (4): 7619-7649 (2015)Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.. MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks., , , , , and . IEEE Access, (2019)Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection., , , , , and . Mach. Vis. Appl., 30 (5): 959-974 (2019)Evader surveillance under incomplete information., , and . ICRA, page 5511-5518. IEEE, (2010)Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification., , and . CIARP, volume 11896 of Lecture Notes in Computer Science, page 230-240. Springer, (2019)Editorial.. Computación y Sistemas, (2012)