From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

U-PriSM 2: the second usable privacy and security for mobile devices workshop., , , и . Mobile HCI, стр. 630-632. ACM, (2013)Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics., и . SOUPS, стр. 163-173. USENIX Association, (2017)A Multi-Agent Approach to Testing Anti-Spam Software., , и . DEXA Workshops, стр. 38-42. IEEE Computer Society, (2009)Using image saliency and regions of interest to encourage stronger graphical passwords., и . ACSAC, стр. 127-138. ACM, (2016)Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime., , , и . TrustCom/BigDataSE, стр. 1242-1249. IEEE, (2018)Invisible, Passive, Continuous and Multimodal Authentication., и . MSSP, том 8045 из Lecture Notes in Computer Science, стр. 34-41. Springer, (2010)Keystroke dynamics: Characteristics and opportunities.. PST, стр. 205-212. IEEE, (2010)Spamulator: the Internet on a laptop., , и . ITiCSE, стр. 142-147. ACM, (2008)Kwyjibo: automatic domain name generation., и . Softw. Pract. Exp., 38 (14): 1561-1567 (2008)Supraliminal Audio Steganography: Audio Files Tricking Audiophiles., и . Information Hiding, том 5806 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2009)