Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 239-249. Springer, (2018)Security Labs for Software Defined Networks in CloudLab., , and . SIGCSE, page 1235. ACM, (2019)Teaching Security Management for Mobile Devices., , , and . SIGITE, page 14-19. ACM, (2016)A course module on web tracking and privacy., , , , and . InfoSecCD, page 10:1-10:7. ACM, (2015)A course module on mobile malware., , , , and . InfoSecCD, page 10:1. ACM, (2014)Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction., , , and . J. Medical Imaging Health Informatics, 11 (7): 1903-1910 (2021)Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework., , , , and . Int. J. Comput. Intell. Appl., 18 (4): 1950022:1-1950022:16 (2019)A Survey of Attacks and Defenses for Deep Neural Networks., , and . CSR, page 254-261. IEEE, (2023)An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms., , and . ICAIC, page 1-6. IEEE, (2022)IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework., , and . ICAIC, page 1-6. IEEE, (2022)