Author of the publication

Are we managing the risk of sharing cyber situational awareness? A UK Public Sector case study.

, and . CyberSA, page 1-2. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Action Sequence Learning for Causal Shape Transformation., , , , and . CoRR, (2016)Upscaling Vector Approximate Message Passing., and . ICASSP, page 4757-4761. IEEE, (2020)Sparse Detection in the Chirplet Transform: Application to FMCW Radar Signals., and . IEEE Trans. Signal Process., 60 (6): 2800-2813 (2012)A feasible Blind Equalization scheme in large constellation MIMO systems., and . ICASSP, page 1845-1848. IEEE, (2008)Are we managing the risk of sharing cyber situational awareness? A UK Public Sector case study., and . CyberSA, page 1-2. IEEE, (2016)Hierarchical Feature Extraction for Efficient Design of Microfluidic Flow Patterns., , , , and . FE@NIPS, volume 44 of JMLR Workshop and Conference Proceedings, page 213-225. JMLR.org, (2015)LookupFFN: Making Transformers Compute-lite for CPU inference., , , , and . CoRR, (2024)LookupFFN: Making Transformers Compute-lite for CPU inference., , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 40707-40718. PMLR, (2023)Compressed Sensing with Upscaled Vector Approximate Message Passing., and . CoRR, (2020)A deep learning framework for causal shape transformation., , , , and . Neural Networks, (2018)