Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog computing security: a review of current applications and security solutions., , and . J. Cloud Comput., (2017)Exploiting automated planning for efficient centralized vehicle routing and mitigating congestion in urban road networks., , and . SAC, page 191-194. ACM, (2019)OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories., , and . Int. J. Pattern Recognit. Artif. Intell., 35 (5): 2150017:1-2150017:31 (2021)Causal Connections Mining Within Security Event Logs., and . K-CAP, page 38:1-38:4. ACM, (2017)Sensing Surface Shape by Touch., and . ICRA (1), page 423-428. IEEE Computer Society Press, (1993)A Jensen-Shannon Divergence Driven Metric of Visual Scanning Efficiency Indicates Performance of Virtual Driving., , , and . ICME, page 1-6. IEEE, (2021)Security auditing in the fog., , , and . ICC, page 191:1-191:9. ACM, (2017)The Application of Automated Planning to Machine Tool Calibration., , , and . ICAPS, AAAI, (2012)Cognitive Effort Measures Driven by Fixation Induced Retinal Flow in Visual Scanning Behavior during Virtual Driving., , , , and . CoRR, (2024)Comparison of deep learning classification models for facial image age estimation in digital forensic investigations., , , and . Forensic Sci. Int. Digit. Investig., (December 2023)