Author of the publication

Spotting Cyber Breaches in IoT Devices.

, and . FedCSIS, volume 35 of Annals of Computer Science and Information Systems, page 1307-1310. (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionarily Tuned Generalized Pseudo-Inverse in Linear Discriminant Analysis., and . Comput. Informatics, 35 (3): 615-634 (2016)GEval: Tool for Debugging NLP Datasets and Models., , , , and . BlackboxNLP@ACL, page 254-262. Association for Computational Linguistics, (2019)Multivariate Functional Regression Analysis with Application to Classification Problems., , and . ECDA, page 173-183. Springer, (2014)Using derivatives in a longest common subsequence dissimilarity measure for time series classification.. Pattern Recognit. Lett., (2014)Spotting Cyber Breaches in IoT Devices., and . FedCSIS, volume 35 of Annals of Computer Science and Information Systems, page 1307-1310. (2023)Sensor-Based Injury Prediction in Football Using a New Interval-Valued Fuzzy Inference Library., , , , , , and . FUZZ, page 1-8. IEEE, (2024)Learning edge importance in bipartite graph-based recommendations., , and . FedCSIS, volume 30 of Annals of Computer Science and Information Systems, page 227-233. (2022)Predicting Player Performance in Tactical Games with the Lightgbm Algorithm., and . ICME Workshops, page 22-27. IEEE, (2023)Dynamic Boundary Time Warping for sub-sequence matching with few examples., , , and . Expert Syst. Appl., (2021)Using derivatives in time series classification., and . Data Min. Knowl. Discov., 26 (2): 310-331 (2013)