Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition approach to gesture language understanding., , , , and . ICPR, page 431-435. IEEE Computer Society, (1996)Sicherer Umgang mit sensiblen Daten - technische Prävention und Reaktionen auf Datenschutzverletzungen., , and . GI Jahrestagung, volume P-154 of LNI, page 186-190. GI, (2009)SoK: The Impact of Unlabelled Data in Cyberthreat Detection., , and . EuroS&P, page 20-42. IEEE, (2022)FPGA vs. Multi-core CPUs vs. GPUs: Hands-On Experience with a Sorting Application., , and . Facing the Multicore-Challenge, volume 6310 of Lecture Notes in Computer Science, page 105-117. Springer, (2010)Comparison of 3D Algorithms for Non-rigid Motion and Correspondence Estimation., and . BMVC, page 1-10. British Machine Vision Association, (2001)Distributed Output Encoding for Multi-Class Pattern Recognition., , , and . ICIAP, page 229-234. IEEE Computer Society, (1999)An Improved Decomposition Algorithm for Regression Support Vector Machines.. NIPS, page 484-490. The MIT Press, (1999)Towards Understanding the Skill Gap in Cybersecurity, , , , and . (July 2022)Machine Learning for Intrusion Detection., , and . NATO ASI Mining Massive Data Sets for Security, volume 19 of NATO Science for Peace and Security Series - D: Information and Communication Security, page 366-373. IOS Press, (2007)SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection., , and . EuroS&P, page 592-614. IEEE, (2023)