Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Legally critical: Defining critical infrastructure in an interconnected world.. Int. J. Crit. Infrastructure Prot., (2018)Trust by Discrimination: Technology Specific Regulation & Explainable AI.. XAILA@JURIX, volume 2381 of CEUR Workshop Proceedings, page 2-8. CEUR-WS.org, (2018)The Czech Court Decisions Corpus (CzCDC): Availability as the First Step., and . CoRR, (2019)Topic Modelling of the Czech Supreme Court Decisions., , and . ASAIL@JURIX, volume 2764 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)'Releasing the Hounds?'1 Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations., and . CyCom, page 93-115. IEEE, (2022)Open Texture in Law, Legal Certainty and Logical Analysis of Natural Language., and . Logic in the Theory and Practice of Lawmaking, volume 2 of Legisprudence Library, Springer, (2015)Toward Linking Heterogenous References in Czech Court Decisions to Content., and . JURIX, volume 302 of Frontiers in Artificial Intelligence and Applications, page 177-182. IOS Press, (2017)IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic., , , and . Digit. Investig., (2020)Lex Rosetta: Transfer of Predictive Models Across Languages, Jurisdictions, and Legal Domains., , , , , , , , , and 8 other author(s). CoRR, (2021)Cyber Weapons Review in Situations Below the Threshold of Armed Conflict., , and . CyCon, page 97-112. IEEE, (2020)