From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Case studies for teaching physical security and security policy., , , и . InfoSecCD, стр. 21-26. ACM, (2010)Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III., , , и . SSCI, стр. 1-8. IEEE, (2017)Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features., , , , , , , и . SSCI, стр. 933-940. IEEE, (2018)An Overhead Reducing Technique for Time Warp., и . DS-RT, стр. 95-102. IEEE Computer Society, (2002)Predicting the Performance of Synchronous Discrete Event Simulation Systems., и . ICCAD, стр. 18-. IEEE Computer Society, (2001)Funnel graph neural networks with multi-granularity cascaded fusing for protein-protein interaction prediction., , , , , и . Expert Syst. Appl., (2024)Developing and Assessing an Educational Game for Teaching Access Control., , , , и . ICER, стр. 312. ACM, (2020)Efficiently unifying parallel simulation techniques., и . ACM Southeast Regional Conference, стр. 228-232. ACM, (2006)Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only)., , , и . SIGCSE, стр. 686. ACM, (2015)Enhancing Cybersecurity Education Using POGIL (Abstract Only)., , , , , и . SIGCSE, стр. 719. ACM, (2017)