Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient computation of distance labeling for decremental updates in large dynamic graphs., , , , and . World Wide Web, 20 (5): 915-937 (2017)OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories., , and . Int. J. Pattern Recognit. Artif. Intell., 35 (5): 2150017:1-2150017:31 (2021)A Hybrid Approach to Process Planning: The Urban Traffic Controller Example., , and . J. Comput. Sci., 13 (8): 257-274 (2017)Fog computing security: a review of current applications and security solutions., , and . J. Cloud Comput., (2017)Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks., , and . SAC, page 191-194. ACM, (2019)Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security., , , , and . ACM Comput. Surv., 53 (4): 85:1-85:29 (2021)Low-cost fitness and activity trackers for biometric authentication., , , and . J. Cybersecur., (2020)Sensing Surface Shape by Touch., and . ICRA (1), page 423-428. IEEE Computer Society Press, (1993)GraphBAD: A general technique for anomaly detection in security information and event management., , , and . Concurr. Comput. Pract. Exp., (2018)Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges., , , and . IEEE Trans. Intell. Transp. Syst., 18 (11): 2898-2915 (2017)