From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Insider Misuse Identification using Transparent Biometrics., , , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)User Profiling Based on Application-Level Using Network Metadata., , , и . ISDFS, стр. 1-8. IEEE, (2019)Physical Activity Recognition by Utilising Smartphone Sensor Signals., , , и . ICPRAM, стр. 342-351. SciTePress, (2019)Real-world smartphone-based gait recognition., , , и . Comput. Secur., (2022)IoT Malware Network Traffic Classification using Visual Representation and Deep Learning., , , и . NetSoft, стр. 444-449. IEEE, (2020)Securing Cloud Storage by Transparent Biometric Cryptography., , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 97-108. Springer, (2018)Two Novel 802.1x Denial of Service Attacks., и . EISIC, стр. 183-190. IEEE Computer Soecity, (2011)Endoscopic Image Analysis for Gastrointestinal Tract Disease Diagnosis Using Nature Inspired Algorithm With Deep Learning Approach., , , , , и . IEEE Access, (2023)Improving Sentiment Analysis of Arabic Tweets., , , , и . SSCC, том 1208 из Communications in Computer and Information Science, стр. 146-158. Springer, (2019)Leveraging Biometrics for Insider Misuse Identification., , , и . Int. J. Cyber Situational Aware., 1 (1): 130-151 (2016)