From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm., , , и . ISPEC, том 11879 из Lecture Notes in Computer Science, стр. 464-475. Springer, (2019)How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , и . PDH, стр. 55-62. ACM, (2019)Offline-enabled web-based E-leaming for improved user experience in Africa., , и . AFRICON, стр. 736-742. IEEE, (2017)Application of quantitative security metrics in cloud computing., , и . ICITST, стр. 256-262. IEEE, (2015)A Security and High-Availability Layer for Cloud Storage., , и . WISE Workshops, том 6724 из Lecture Notes in Computer Science, стр. 449-462. Springer, (2010)Normalizing Security Events with a Hierarchical Knowledge Base., , , и . WISTP, том 9311 из Lecture Notes in Computer Science, стр. 237-248. Springer, (2015)Segmenting of Recorded Lecture Videos - The Algorithm VoiceSeg., и . SIGMAP, стр. 317-322. INSTICC Press, (2006)Virtualisierung und Cloud Computing, Konzepte, Technologiestudie, Marktübersicht. Technische Berichte des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam;44 Universitätsverlag Potsdam, (2011)Christoph Meinel; Christian Willems; Sebastian Roschke; Maxim Schnjakin.On Measuring Expertise in Collaborative Tagging Systems, , , , и . WebSci'09: Web Science Conference 2009 - Society On-Line, Athens, Greece, 18-20 March, 2009, (марта 2009)Measuring Expertise in Online Communities., , , , и . IEEE Intelligent Systems, 26 (1): 26-32 (2011)