Home

image vaporisateur Oxyde dblp ioannis stylios Incertain distance Ennuyeux

PDF) On the need for different security methods on mobile phones
PDF) On the need for different security methods on mobile phones

PDF) Journal of Computer Science IJCSIS January 2017 Part I.pdf | Journal  of Computer Science IJCSIS - Academia.edu
PDF) Journal of Computer Science IJCSIS January 2017 Part I.pdf | Journal of Computer Science IJCSIS - Academia.edu

PDF) Biometrics and e-Identity (e-Passport) in the European Union: End-User  Perspectives on the Adoption of a Controversial Innovation
PDF) Biometrics and e-Identity (e-Passport) in the European Union: End-User Perspectives on the Adoption of a Controversial Innovation

PDF) Design, Analysis and Performance Evaluation of Group Key Establishment  in Wireless Sensor Networks.
PDF) Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks.

dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub
dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub

PDF) Redefining Information Systems Security: Viable Information Systems.
PDF) Redefining Information Systems Security: Viable Information Systems.

Ioannis Paparrizos's research works | École Polytechnique Fédérale de  Lausanne, Lausanne (EPFL) and other places
Ioannis Paparrizos's research works | École Polytechnique Fédérale de Lausanne, Lausanne (EPFL) and other places

PDF) Incorporating Security Requirements Into the Software Development  Process.
PDF) Incorporating Security Requirements Into the Software Development Process.

PDF) A Framework for Exploiting Security Expertise in Application  Development
PDF) A Framework for Exploiting Security Expertise in Application Development

PDF) Machine learning algorithms for improving security on touch screen  devices: a survey, challenges and new perspectives | Liyana Shuib -  Academia.edu
PDF) Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives | Liyana Shuib - Academia.edu

PDF) A Critical Approach to Privacy Research in Ubiquitous Environments –  Issues and Underlying Assumptions
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

PDF) SenGuard: Passive user identification on smartphones using multiple  sensors
PDF) SenGuard: Passive user identification on smartphones using multiple sensors

dblp: Browse Persons
dblp: Browse Persons

PDF) A cross media platform for personalized leisure & entertainment: The  POLYMNIA approach
PDF) A cross media platform for personalized leisure & entertainment: The POLYMNIA approach

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

PDF) Neural Recognition and Genetic Features Selection for Robust Detection  of E-Mail Spam
PDF) Neural Recognition and Genetic Features Selection for Robust Detection of E-Mail Spam

PDF) Dynamic Bayesian approach to forecasting
PDF) Dynamic Bayesian approach to forecasting

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

PDF) Using the Lens of Circuits of Power in Information Systems Security  Management
PDF) Using the Lens of Circuits of Power in Information Systems Security Management

PDF) Facial feature detection using distance vector fields
PDF) Facial feature detection using distance vector fields

PDF) Detection of facial characteristics based on edge information.
PDF) Detection of facial characteristics based on edge information.

PDF) Combining Biometric Evidence for Person Authentication
PDF) Combining Biometric Evidence for Person Authentication

PDF) Adoption of Biometric Authentication Systems: Implications for  Research and Practice in the Deployment of End-User Security Systems
PDF) Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems

Yoshua Bengio - Mila
Yoshua Bengio - Mila

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

Dimitrios Kanoulas, Ph.D.
Dimitrios Kanoulas, Ph.D.

crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub
crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home