Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs., , , , , , , , and . DRCN, page 1-5. IEEE, (2023)A methodology to evaluate the evolution of networks using topological data analysis., and . CoRR, (2020)Machine Learning based System for Vessel Turnaround Time Prediction., , , , and . CoRR, (2021)Variable sets over an algebra of lifetimes: a contribution of lattice theory to the study of computational topology., , and . CoRR, (2014)Open problems from NCS 2018., and . Art Discret. Appl. Math., (2019)HPC application optimisation in SODALITE., , , , , , , and . SYSTOR, page 23:1. ACM, (2021)Security in DevSecOps: Applying Tools and Machine Learning to Verification and Monitoring Steps., , , , , , and . ICPE (Companion), page 201-205. ACM, (2023)On the Hierarchy of d-structures., and . Order, 34 (1): 139-163 (2017)Aspects of an internal logic for persistence., , and . CoRR, (2014)Meaningful Big Data Integration for a Global COVID-19 Strategy., , , , , , , , , and 13 other author(s). IEEE Comput. Intell. Mag., 15 (4): 51-61 (2020)