Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ScaIOTA: Scalable Secure Over-the-Air Software Updates for Vehicles., , and . SRDS, page 151-161. IEEE, (2023)Towards end-to-end Cyberthreat Detection from Twitter using Multi-Task Learning., , , and . IJCNN, page 1-8. IEEE, (2020)Design of a Classification Model for a Twitter-Based Streaming Threat Monitor., , and . DSN Workshops, page 9-14. IEEE, (2019)On the Bug-proneness of Structures Inspired by Functional Programming in JavaScript Projects., , , and . CoRR, (2022)Processing tweets for cybersecurity threat awareness., , , and . Inf. Syst., (2021)Monitoring and Mapping Vineyard Water Status Using Non-Invasive Technologies by a Ground Robot., , , , , , , , and . Remote. Sens., 13 (14): 2830 (2021)Cloud and Services Testing Applied in Manufacturing., , , , , , , and . I-ESA, volume 8 of Proceedings of the I-ESA Conferences, page 25-38. Springer, (2016)Robotics-based vineyard water potential monitoring at high resolution., , , and . Comput. Electron. Agric., (2021)ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles., , and . CoRR, (2023)Follow the Blue Bird: A Study on Threat Data Published on Twitter., , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 217-236. Springer, (2020)