Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling denial of service attacks on JFK with Meadows's cost-based framework., , and . ACSW, volume 54 of CRPIT, page 125-134. Australian Computer Society, (2006)Modeling and Verification of Privacy Enhancing Protocols., , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 127-146. Springer, (2009)Towards an AI Holodeck: Generating Virtual Scenes from Sparse Natural Language Input., , , , and . AIIDE Workshops, volume 3217 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Explainable CLIP-Guided 3D-Scene Generation in an AI Holodeck., , and . AIIDE, page 276-278. AAAI Press, (2022)Modeling Music and Code Knowledge to Support a Co-creative AI Agent for Education., , , , , and . ISMIR, page 134-141. (2020)Modeling South African Service Protests Using the National Operational Environment Model., , , , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 298-305. Springer, (2012)The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers., , , , , and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 3-20. Springer, (2014)Security as a Safety Issue in Rail Communications., , and . SCS, volume 33 of CRPIT, page 79-88. Australian Computer Society, (2003)Google's Neural Machine Translation System: Bridging the Gap between Human and Machine Translation, , , , , , , , , and 20 other author(s). arXiv.org, (September 2016)Risk Modelling the Transition of SCADA System to IPv6., , , , and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 384-395. Springer, (2010)