Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Login Security Through the Use of Keystroke Input Dynamics., , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 661-667. Springer, (2006)Grid data mining by means of learning classifier systems and distributed model induction., , and . GECCO (Companion), page 391-398. ACM, (2011)On the Use of Rough Sets for User Authentication Via Keystroke Dynamics., , and . EPIA Workshops, volume 4874 of Lecture Notes in Computer Science, page 145-159. Springer, (2007)Rethinking engineering education., , , , , and . FIE, page 1-5. IEEE Computer Society, (2017)Security metrics to evaluate organizational IT security., and . ICEGOV, page 500-501. ACM, (2014)Enrolment time as a requirement for biometric fingerprint recognition., , and . Int. J. Electron. Secur. Digit. Forensics, 6 (1): 18-24 (2014)Global perspectives on cybersecurity education., , , , , , , , and . ITiCSE, page 340-341. ACM, (2018)Study of the Perception on the Biometric Technology by the Portuguese Citizens., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 280-287. Springer, (2011)A Security Audit Framework to Manage Information System Security., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 9-18. Springer, (2010)Modeling industrial embedded systems with UML., , and . CODES, page 18-22. ACM, (2000)