From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The many faces of active cyber., , и . Netw. Secur., 2019 (2): 20 (2019)Optimized Brain Tumor Detection: A Dual-Module Approach for MRI Image Enhancement and Tumor Classification., , , , , и . IEEE Access, (2024)Evolving techniques in cyber threat hunting: A systematic review., , , , , , , , , и 1 other автор(ы). J. Netw. Comput. Appl., (2024)Vision Transformers for Action Recognition: A Survey., , , и . CoRR, (2022)A COVID-19-Based Modified Epidemiological Model and Technological Approaches to Help Vulnerable Individuals Emerge from the Lockdown in the UK., , , , , и . Sensors, 20 (17): 4967 (2020)The Physics of Preference: Unravelling Imprecision of Human Preferences through Magnetisation Dynamics., и . Inf., 15 (7): 413 (июля 2024)The Physics of Preference: Unravelling Imprecision of Human Preferences through Magnetisation Dynamics., и . CoRR, (2023)Understanding happiness in cities using Twitter: Jobs, children, and transport., , , и . ISC2, стр. 1-7. IEEE, (2016)Naive advice when half a million is at stake. Economics Letters, 98 (2): 148--154 (февраля 2008)RAIDER: Reinforcement-Aided Spear Phishing Detector., , , , , , , и . NSS, том 13787 из Lecture Notes in Computer Science, стр. 23-50. Springer, (2022)