Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis., , , and . IEEE Access, (2019)Blockchain-Based Distributed Marketplace., and . BIS (Workshops), volume 339 of Lecture Notes in Business Information Processing, page 197-210. Springer, (2018)TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks., , and . IEEE Access, (2018)Quantifying security risk level from CVSS estimates of frequency and impact., , and . J. Syst. Softw., 83 (9): 1622-1634 (2010)Privacy verification of PhotoDNA based on machine learning., , , , , , and . Security and Privacy for Big Data, Cloud Computing and Applications, Institution of Engineering and Technology, (2019)Forensically-Sound Analysis of Security Risks of Using Local Password Managers., , and . RE Workshops, page 114-121. IEEE Computer Society, (2016)On Locky Ransomware, Al Capone and Brexit., and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 33-45. Springer, (2017)Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients., , and . SAC, page 66-73. ACM, (2009)A Systematic Literature Review on Cyber Security Education for Children., , and . IEEE Trans. Educ., 66 (3): 274-286 (June 2023)WVD: A New Synthetic Dataset for Video-Based Violence Detection., , , and . SGAI Conf., volume 11927 of Lecture Notes in Computer Science, page 158-164. Springer, (2019)