From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm., , , и . ISPEC, том 11879 из Lecture Notes in Computer Science, стр. 464-475. Springer, (2019)Normalizing Security Events with a Hierarchical Knowledge Base., , , и . WISTP, том 9311 из Lecture Notes in Computer Science, стр. 237-248. Springer, (2015)How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , и . PDH, стр. 55-62. ACM, (2019)Authorship Verification on Short Text Samples Using Stylometric Embeddings., , , и . AIST, том 11179 из Lecture Notes in Computer Science, стр. 64-75. Springer, (2018)Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity., , и . TrustCom, стр. 587-597. IEEE, (2021)Students' Achievement of Personalized Learning Objectives in MOOCs., , и . L@S, стр. 147-156. ACM, (2020)The Impact of Mobile Learning on Students' Self-Test Behavior in MOOCs., и . L@S, стр. 251-254. ACM, (2021)Understanding asynchronous design work - segmentation of digital whiteboard sessions., и . IRI, стр. 700-705. IEEE, (2012)Assessing Image and Text Generation with Topological Analysis and Fuzzy Logic., , и . WACV, стр. 2012-2021. IEEE, (2021)A Taxonomy of Trust Models for Attribute Assurance in Identity Management., , , и . AINA Workshops, том 1150 из Advances in Intelligent Systems and Computing, стр. 65-76. Springer, (2020)