From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition., , , , и . DESRIST, том 13229 из Lecture Notes in Computer Science, стр. 195-207. Springer, (2022)Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain., , , , , , и . HICSS, стр. 3719-3728. ScholarSpace, (2024)Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models., , , , и . ECIS, (2023)Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data., , , и . HICSS, стр. 1-9. ScholarSpace, (2022)Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model., , , , , , и . HICSS, стр. 6118-6127. ScholarSpace, (2023)Are You Aware of Your Competencies? - the potentials of Competence Research to Design Effective SETA Programs., , , , и . ECIS, (2022)Consumer Cyber Insurance as Risk Transfer: A Coverage Analysis., , , и . CENTERIS/ProjMAN/HCist, стр. 521-528. Elsevier, (2022)Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance., , , и . ICIS, Association for Information Systems, (2023)