Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Flexible Hardware Implementation for Mixed-Radix Fourier Transforms., , , and . HPEC, page 1-7. IEEE, (2023)Sugars and enzyme activity in the grass Deschampsia antarctica, , , , and . Antarctic Science, 15 (04): 483--491 (2003)Intelligent Multi-device user Interfaces., and . PECCS, page 309-312. SciTePress, (2011)Ontology-based approach to real-time risk management and cyber-situational awareness., , , , , and . Future Gener. Comput. Syst., (April 2023)Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations., , , , , and . ARES, page 100:1-100:9. ACM, (2020)Automatic Translation and Enforcement of Cybersecurity Policies Using A High-Level Definition Language., , , , , and . Entropy, 21 (12): 1180 (2019)Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies., , , and . IEEE Access, (2020)Methodology for massive configuration of OAuth 2.0 tokens in large IoT scenarios., , and . Intelligent Environments, page 5-12. IEEE, (2020)Smart Spaces and Smart Objects Interoperability Architecture (S3OiA)., , , , , and . IMIS, page 725-730. IEEE Computer Society, (2012)A Bop and Beyond: A Second Order Optimizer for Binarized Neural Networks., , , , and . CVPR Workshops, page 1273-1281. Computer Vision Foundation / IEEE, (2021)