Author of the publication

Traffic-Based Automatic Detection of Browser Fingerprinting.

, , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 365-385. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic speech recognition for launch control center communication using recurrent neural networks with data augmentation and custom language model., , , , and . CoRR, (2018)A Decision Support Tool for a Unified Homeland Security Strategy., , , and . Critical Infrastructure Protection, volume 441 of IFIP Advances in Information and Communication Technology, page 195-211. Springer, (2014)Towards a Comparable Cross-Sector Risk Analysis: RAMCAP Revisited., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 221-237. (2016)Designing SSI clusters with hierarchical checkpointing and single I/O space., , , , and . IEEE Concurrency, 7 (1): 60-69 (1999)Thermal Therapy With a Fully Electronically Steerable HIFU Phased Array Using Ultrasound Guidance and Local Harmonic Motion Monitoring., , , , , , , , , and 3 other author(s). IEEE Trans. Biomed. Eng., 67 (7): 1854-1862 (2020)Small Target Detection for Search and Rescue Operations using Distributed Deep Learning and Synthetic Data Generation., , , , , , , and . CoRR, (2019)Multi-channel software-based MAC protocol for UWSNs., and . IPSN, page 323-324. ACM, (2019)A computational asset vulnerability model for the strategic protection of the critical infrastructure., , and . Int. J. Crit. Infrastructure Prot., 7 (3): 167-177 (2014)A 3D Curve Chain Code Representation for the Analysis of Human Motion Similarity., and . DMS, page 132-136. Knowledge Systems Institute, (2010)Saving Electronic Health Record (EHR) in private and secure mHealth system with blockchain Smart contracts., and . AINA (3), volume 227 of Lecture Notes in Networks and Systems, page 159-164. Springer, (2021)