Author of the publication

Fully RNN for knee ligament tear classification and localization in MRI scans.

, , , , and . Computational Imaging, page 1-6. Society for Imaging Science and Technology, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and detection of malicious data exfiltration in web traffic., and . MALWARE, page 26-31. IEEE Computer Society, (2012)Fully RNN for knee ligament tear classification and localization in MRI scans., , , , and . Computational Imaging, page 1-6. Society for Imaging Science and Technology, (2022)An Evolution Roadmap for Community Cyber Security Information Sharing Maturity Model., and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)State and Community Information Sharing and Analysis Organizations., and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)Cyber Security and Government Fusion Centers., and . HICSS, page 205. IEEE Computer Society, (2008)A Taxonomy of Cyber Events Affecting Communities., and . HICSS, page 1-9. IEEE Computer Society, (2011)Introduction to the Minitrack on Cybersecurity in Digital Government., , and . HICSS, page 1. ScholarSpace, (2019)Methodology To Determine Security ROI., and . AMCIS, page 550. Association for Information Systems, (2004)An Empirical Study on the Effectiveness of Common Security Measures., and . HICSS, page 1-7. IEEE Computer Society, (2010)Introduction to the Minitrack on Cybersecurity and Privacy in Government., , and . HICSS, page 1-2. ScholarSpace, (2020)