Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , and . CNS, page 1-10. IEEE, (2020)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AI Mag., 37 (2): 33-46 (2016)Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data., , , , , , , and . AAAI, page 3912-3919. AAAI Press, (2015)Vulnerability Metrics for Graph-based Configuration Security., , , , and . SECRYPT, page 259-270. SCITEPRESS, (2021)Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool., , , , , and . AVI, page 108-111. ACM, (2016)Automatic Digitization and Orientation of Scanned Mesh Data for Floor Plan and 3D Model Generation., , , , and . CGI, volume 14496 of Lecture Notes in Computer Science, page 53-69. Springer, (2023)An attack volume metric., , , , and . Secur. Priv., (July 2023)Two-Part Texture Mappings., and . IEEE Computer Graphics and Applications, 6 (9): 40-53 (1986)Icon abacus: positional display of document attributes., and . JCDL, page 289-290. ACM, (2005)Graphical search and replace., and . SIGGRAPH, page 113-120. ACM, (1988)