Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile device management (MDM) technologies, issues and challenges., and . ICCSP, page 143-147. ACM, (2019)Hybrid IoT Cyber Range., , , and . Sensors, 23 (6): 3071 (March 2023)Attention-based LSTM Network for Action Recognition in Sports., , , , , and . IRIACV, page 1-6. Society for Imaging Science and Technology, (2021)Beyond Theory: Investigating the Practical Feasibility of Confidential Computing., , , and . FIT, page 154-159. IEEE, (2023)Cyber Security Skill Set Analysis for Common Curricula Development., and . ARES, page 37:1-37:8. ACM, (2019)Automatic Verification and Execution of Cyber Attack on IoT Devices., , , and . Sensors, 23 (2): 733 (January 2023)Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study., , and . HCI (15), volume 12776 of Lecture Notes in Computer Science, page 462-483. Springer, (2021)Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper., and . AAAI Fall Symposium: ALEC, volume 2269 of CEUR Workshop Proceedings, page 41-43. CEUR-WS.org, (2018)Data Driven Skill Assessment for Cybersecurity Exercises., , , , , and . FiCloud, page 359-366. IEEE, (2023)SMT: Self-supervised Approach for Multiple Animal Detection and Tracking., , , , , , and . AIAI (2), volume 712 of IFIP Advances in Information and Communication Technology, page 307-317. Springer, (2024)