Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensional data model for early alerts of malicious activities in a CSIRT., , , , and . SPECTS, page 1-8. IEEE, (2017)An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence., , , , , and . Syst., 5 (4): 52 (2017)On the Development of Strategic Games based on a Semiotic Analysis: A Case Study of an Optimized Tic-Tac-Toe., , , , , , and . ICEIS (1), page 425-432. SciTePress, (2016)Early Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing., , , , , and . CITI, volume 883 of Communications in Computer and Information Science, page 240-251. Springer, (2018)Serious 3D Game over a Cluster Computing for Situated Learning of Traffic Signals., , , , , , and . DS-RT, page 1-10. IEEE, (2019)Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems., , and . Expert Syst. Appl., 238 (Part E): 122223 (March 2024)Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML., , , , and . Ann. des Télécommunications, 64 (5-6): 305-323 (2009)BotHook: An option against Cyberpedophilia., , , and . CSNet, page 1-3. IEEE, (2017)On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key., , and . Secur. Commun. Networks, (2019)Information Security Management in University Campus Using Cognitive Security, , , , , , , and . International Journal of Computer Science and Security (IJCSS), 13 (4): 124 - 134 (August 2019)