Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web user clustering from access log using belief function., and . K-CAP, page 202-208. ACM, (2001)Image recovery and segmentation using competitive learning in a layered network., and . IEEE Trans. Neural Networks, 7 (4): 843-856 (1996)"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders., , , , and . WWW, page 3685-3694. ACM, (2022)Investigating hidden Markov models capabilities in anomaly detection., and . ACM Southeast Regional Conference (1), page 98-103. ACM, (2005)Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion., , , , and . WIFS, page 1-6. IEEE, (2017)Size-based scheduling: a recipe for DDOS?, , and . CCS, page 729-731. ACM, (2010)On Controlling Genuine Reject Rate in Multi-stage Biometric Verification., , and . CVPR Workshops, page 194-199. IEEE Computer Society, (2013)Competition between SOM Clusters to Model User Authentication System in Computer Networks., and . COMSWARE, IEEE, (2007)On the Complexity of Aggregating Information for Authentication and Profiling., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 58-71. Springer, (2011)Adversarial Activity Detection Using Keystroke Acoustics., and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 626-648. Springer, (2021)