Author of the publication

Mining Significant Frequent Patterns in Parallel Episodes with a Graded Notion of Synchrony and Selective Participation.

, and . IJCCI (NCTA), page 39-48. SciTePress, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking a Smartphone Biometric Fingerprint System: A Novice's Approach., , , , , , , , , and 6 other author(s). ICCST, page 1-5. IEEE, (2018)AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions., , , , , , , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis., , , and . ARES, page 61:1-61:8. ACM, (2021)Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines., , , , , , , and . EURASIP J. Inf. Secur., (2020)A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper)., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 413-423. Springer, (2021)Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective., , , , , , , , and . ARES, page 135:1-135:12. ACM, (2022)