From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber threat hunting using unsupervised federated learning and adversary emulation., и . CSR, стр. 315-320. IEEE, (2023)Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching., , , и . EISIC, стр. 139-142. IEEE Computer Society, (2017)MaTED: Metadata-Assisted Twitter Event Detection System., , , и . IPMU (1), том 1237 из Communications in Computer and Information Science, стр. 402-414. Springer, (2020)Covert Online Ethnography and Machine Learning for Detecting Individuals at Risk of Being Drawn into Online Sex Work., , , , и . ASONAM, стр. 1096-1099. IEEE Computer Society, (2018)Hack the Room: Exploring the potential of an augmented reality game for teaching cyber security., , , , , и . AHs, стр. 349-353. ACM, (2023)On the Use of URLs and Hashtags in Age Prediction of Twitter Users., , , , и . IRI, стр. 62-69. IEEE, (2018)Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi., , , , , , и . EISIC, стр. 130-133. IEEE, (2019)CYGENT: A cybersecurity conversational agent with log summarization powered by GPT-3., , и . CoRR, (2024)Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection., и . Comput. Secur., (2024)GPT-2C: a parser for honeypot logs using large pre-trained language models., , , , , и . ASONAM, стр. 649-653. ACM, (2021)