Home

schützen Welken Wanderung ioannis stylios dblp Wasser Zurückhalten Sache

PDF) Using the Lens of Circuits of Power in Information Systems Security  Management
PDF) Using the Lens of Circuits of Power in Information Systems Security Management

PDF) A Framework for Exploiting Security Expertise in Application  Development
PDF) A Framework for Exploiting Security Expertise in Application Development

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

PDF) Walk the Walk: Attacking Gait Biometrics by Imitation
PDF) Walk the Walk: Attacking Gait Biometrics by Imitation

PDF) SenGuard: Passive user identification on smartphones using multiple  sensors
PDF) SenGuard: Passive user identification on smartphones using multiple sensors

PDF) Elaborating Quantitative Approaches for IT Security Evaluation
PDF) Elaborating Quantitative Approaches for IT Security Evaluation

PDF) Combinations of Case-Based Reasoning with Other Intelligent Methods
PDF) Combinations of Case-Based Reasoning with Other Intelligent Methods

PDF) Teaching NL to FOL and FOL to CF conversions
PDF) Teaching NL to FOL and FOL to CF conversions

PDF) Clustering Uncertain Trajectories
PDF) Clustering Uncertain Trajectories

PDF) “Trust Engineering:” From Requirements to System Design and  Maintenance – A Working National Lottery System Experience
PDF) “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience

PDF) Information systems security from a knowledge management perspective
PDF) Information systems security from a knowledge management perspective

PDF) A Critical Approach to Privacy Research in Ubiquitous Environments –  Issues and Underlying Assumptions
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions

PDF) Trust Management Framework for Intelligent Agent Negotiations in  Ubiquitous Computing Environments
PDF) Trust Management Framework for Intelligent Agent Negotiations in Ubiquitous Computing Environments

PDF) Privacy and fair information practices in ubiquitous environments:  Research challenges and future directions
PDF) Privacy and fair information practices in ubiquitous environments: Research challenges and future directions

PDF) A GA Driven Intelligent System for Medical Diagnosis
PDF) A GA Driven Intelligent System for Medical Diagnosis

dblp.yaml/cbm.yaml at master · davidar/dblp.yaml · GitHub
dblp.yaml/cbm.yaml at master · davidar/dblp.yaml · GitHub

PDF) Incorporating Security Requirements Into the Software Development  Process.
PDF) Incorporating Security Requirements Into the Software Development Process.

Ioannis Paparrizos's research works | École Polytechnique Fédérale de  Lausanne, Lausanne (EPFL) and other places
Ioannis Paparrizos's research works | École Polytechnique Fédérale de Lausanne, Lausanne (EPFL) and other places

PDF) Dynamic Bayesian approach to forecasting
PDF) Dynamic Bayesian approach to forecasting

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub
crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub

PDF) Security in the Wild: User Strategies for Managing Security as an  Everyday, Practical Problem
PDF) Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers