Author of the publication

Operational Hazard Risk Assessment using Bayesian Networks.

, , and . ICEIS (2), page 135-139. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , and . RecSys, page 385-386. ACM, (2016)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , and . CoRR, (2018)Simulation and inversion of electrical conductivity distribution using the finite functions method., , , , and . FSKD, page 2746-2749. IEEE, (2012)Research on Embedded-Based Wireless Authentication System., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 469-475. Springer, (2012)Temporally Invariant Junction Tree for Interference in Dynamic Bayesian Network.. Artificial Intelligence Today, volume 1600 of Lecture Notes in Computer Science, Springer, (1999)A survey on security control and attack detection for industrial cyber-physical systems., , , , and . Neurocomputing, (2018)Comparison of multiagent inference methods in multiply sectioned Bayesian networks.. Int. J. Approx. Reason., 33 (3): 235-254 (2003)COVID-19 trial graph: a linked graph for COVID-19 clinical trials., , , , , , and . J. Am. Medical Informatics Assoc., 28 (9): 1964-1969 (2021)A study of data pre-processing techniques for imbalanced biomedical data classification., , , , and . Int. J. Bioinform. Res. Appl., 16 (3): 290-318 (2020)