Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial.. Computación y Sistemas, (2012)An Approach Based on Contrast Patterns for Bot Detection on Web Log Files., , , , and . MICAI (1), volume 11288 of Lecture Notes in Computer Science, page 276-285. Springer, (2018)Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.. MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection., , , , , and . Mach. Vis. Appl., 30 (5): 959-974 (2019)DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks., , , , , and . IEEE Access, (2019)Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification., , and . CIARP, volume 11896 of Lecture Notes in Computer Science, page 230-240. Springer, (2019)Evader surveillance under incomplete information., , and . ICRA, page 5511-5518. IEEE, (2010)Integrating Knowledge Graph Data with Large Language Models for Explainable Inference., and . WSDM, page 1198-1199. ACM, (2024)Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems., , and . Blockchain, page 126-133. IEEE, (2020)The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures Against Intentional Attacks., , , , and . IEEE Syst. J., 15 (2): 2959-2970 (2021)