Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VIPOC Project Research Summary (Discussion Paper)., , , , , , , , and . SEBD, page 208-215. Curran Associates, Inc., (2015)A compact encoding of security logs for high performance activity detection., and . PDP, page 240-244. IEEE, (2021)Some Experiments on High Performance Anomaly Detection., and . PDP, page 226-229. IEEE, (2022)Exotic Compilers as a Malware Evasion Technique., , and . SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 916-920. IEEE, (2023)Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living., , , , and . ICHMS, page 1-6. IEEE, (2020)How to implement a big data clustering algorithm: a brief report on lesson learned., , , and . SAC, page 1073-1080. ACM, (2019)FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples., , , and . Inf. Fusion, (2023)Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone., , , , , , , , and . Checkmate@CCS, page 43-57. ACM, (2021)Explaining Binary Obfuscation., , , and . CSR, page 22-27. IEEE, (2023)