Author of the publication

Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.

, , , , , , , , , , and . AVSS, page 307-312. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind the Web, , , , , and . (2008)The Pendle: A Wearable Mediator for Mixed Initiative Environments, , , and . International Workshop on Intelligent Environments, (2005)Mensch & Computer 2010, and . München: Oldenbourg Verlag, (2010)Publikationsliste von intermedia, , and . Universitätsverlag Göttingen, (2007)The history of adolescent medicine: three periods of awareness and development during the twentieth century.. Medicine and health, Rhode Island, 82 (11): 386 (1999)Modelluntersuchungen zum Flüsigkeitshaushalt des menschlichen Körpers., and . GI Jahrestagung, volume 50 of Informatik-Fachberichte, page 590-597. Springer, (1981)A circular RNA derived from the insulin receptor locus protects against doxorubicin-induced cardiotoxicity, , , , , , , , , and 13 other author(s). Eur Heart J, 43 (42): 4496-4511 (June 2022)Auswertung Experten-Fokus-Gruppe zum PEF-Curriculum, , , and . Physikalische Medizin, Rehabilitationsmedizin, Kurortmedizin, 16 (04): A20 (2006)HW. There is More to Context than Location: Environment Sensing Technologies for Adaptive Mobile User Interfaces, , and . Workshop on Interactive Applications of Mobile Computing IMC’98, (1998)Towards a global participatory platform: democratising open data, complexity science and collective intelligence, , , , , , , , , and 1 other author(s). The European Physical Journal Special Topics, 214 (1): 109--152 (2012)