Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Training Using Natural Transformation., , , , , and . CoRR, (2021)A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context., , and . CoRR, (2022)SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market., , , and . CoRR, (2023)Adversarial Defense by Latent Style Transformations., , , , , and . CoRR, (2020)Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1526-1539 (2022)Security knowledge representation artifacts for creating secure IT systems., , , and . Comput. Secur., (2017)Cybersecurity in Pacific Island nations., , and . Commun. ACM, 63 (4): 53-54 (2020)A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection., , , , , and . CoRR, (2024)Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012)., , and . Software Engineering, volume P-198 of LNI, page 198-200. GI, (2012)CeMoSS - Certification and Model-Driven Development of Safe and Secure Software., , and . Software Engineering, volume P-227 of LNI, page 207-208. GI, (2014)