Author of the publication

How to implement a big data clustering algorithm: a brief report on lesson learned.

, , , and . SAC, page 1073-1080. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A compact encoding of security logs for high performance activity detection., and . PDP, page 240-244. IEEE, (2021)Some Experiments on High Performance Anomaly Detection., and . PDP, page 226-229. IEEE, (2022)VIPOC Project Research Summary (Discussion Paper)., , , , , , , , and . SEBD, page 208-215. Curran Associates, Inc., (2015)Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 916-920. IEEE, (2023)Exotic Compilers as a Malware Evasion Technique., , and . SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)How to implement a big data clustering algorithm: a brief report on lesson learned., , , and . SAC, page 1073-1080. ACM, (2019)Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living., , , , and . ICHMS, page 1-6. IEEE, (2020)FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples., , , and . Inf. Fusion, (2023)Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone., , , , , , , , and . Checkmate@CCS, page 43-57. ACM, (2021)Explaining Binary Obfuscation., , , and . CSR, page 22-27. IEEE, (2023)