biztosan Tölgy Könnyen dblp ioannis stylios győzelem Kaliber Gyors
PDF) Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems
PDF) A Framework for Exploiting Security Expertise in Application Development
PDF) Automatic Detection and Prevention of Cyberbullying | Neel Roy - Academia.edu
The h-index for Greek origin Computer Scientists & Engineers
PDF) Using the Lens of Circuits of Power in Information Systems Security Management
PDF) Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks.
PDF) Elaborating Quantitative Approaches for IT Security Evaluation
Stylianos I. Venieris | Home
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions
PDF) Incorporating Security Requirements Into the Software Development Process.
PDF) Neural Recognition and Genetic Features Selection for Robust Detection of E-Mail Spam
PDF) Journal of Computer Science IJCSIS January 2017 Part I.pdf | Journal of Computer Science IJCSIS - Academia.edu
PDF) Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives | Liyana Shuib - Academia.edu
PDF) SenGuard: Passive user identification on smartphones using multiple sensors
Yoshua Bengio - Mila
PDF) Detection of facial characteristics based on edge information.
dblp: Browse Persons
Stylianos I. Venieris | Home
PDF) Facial feature detection using distance vector fields
dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub
crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub
PDF) Combining Biometric Evidence for Person Authentication