Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-sample Prediction Intervals for Extreme Learning Machines., , , and . CoRR, (2019)A Model for Metricising Privacy and Legal Compliance., , and . QUATIC, page 229-237. IEEE Computer Society, (2018)Guest Editorial: Trust, Security and Privacy of 6G., , , , , and . IEEE Netw., 36 (4): 100-102 (2022)On the Development of a Metric for Quality of Information Content over Anonymised Data-Sets., and . QUATIC, page 185-190. IEEE Computer Society, (2016)Spiking Networks for Improved Cognitive Abilities of Edge Computing Devices., , , , , and . CoRR, (2019)Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers., , , and . CIS, page 1016-1023. IEEE Computer Society, (2011)A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment., , , , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 87-98. Springer, (2018)Incremental ELMVIS for unsupervised learning., , , , , , , and . CoRR, (2019)Secure Keying Scheme for Network Slicing in 5G Architecture., , , , and . CSCN, page 1-6. IEEE, (2019)