Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Ear Biometrics.. Encyclopedia of Biometrics, Springer US, (2015)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)Comprehensive Approach to Information Sharing for increased Network Security and Survivability.. Cybern. Syst., 44 (6-7): 550-568 (2013)Image Filtration and Feature Extraction for Face Recognition., and . Biometrics, Computer Security Systems and Artificial Intelligence Applications, Springer, (2006)Netflow-Based Malware Detection and Data Visualisation System., , and . CISIM, volume 10244 of Lecture Notes in Computer Science, page 652-660. Springer, (2017)Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics., , and . IP&C, volume 681 of Advances in Intelligent Systems and Computing, page 43-48. Springer, (2017)Practical Applications of Data Analysis, Classification and Anomaly Detection., , , and . J. Univers. Comput. Sci., 26 (4): 432-433 (2020)Statistical and signal-based network traffic recognition for anomaly detection., , , and . Expert Syst. J. Knowl. Eng., 29 (3): 232-245 (2012)