From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired algorithms., и . Comput. Electr. Eng., (2022)A hybrid machine learning model for intrusion detection in VANET., , и . Computing, 104 (3): 503-531 (2022)Forensic-Ready Risk Management Concepts., , , , , и . CoRR, (2022)Frustrations Steering Women Away From Software Engineering., и . IEEE Softw., 39 (4): 63-69 (2022)Predictive Simulation within the Process of Building Trust., , и . ICSA Companion, стр. 47-48. IEEE, (2022)Scaling Big Data Applications in Smart City with Coresets., , , и . DATA, стр. 357-363. SciTePress, (2019)Recent Advances in Machine-Learning Driven Intrusion Detection in Transportation: Survey., и . ANT/EDI40, том 184 из Procedia Computer Science, стр. 877-886. Elsevier, (2021)Adopting the Actor Model for Antifragile Serverless Architectures., , , и . ICSOFT, стр. 612-619. SCITEPRESS, (2023)A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture., , , , , и . CAiSE, том 13901 из Lecture Notes in Computer Science, стр. 522-538. Springer, (2023)AI-Based Software Defect Prediction for Trustworthy Android Apps., , и . EASE, стр. 393-398. ACM, (2022)