Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Drosou, Anastasios
add a person with the name Drosou, Anastasios
 

Other publications of authors with the same name

Border gateway protocol graph: detecting and visualising internet routing anomalies., , , and . IET Information Security, 10 (3): 125-133 (2016)Gamification concepts for leveraging knowledge sharing in Industry 4.0., , , , , , , , and . Int. J. Serious Games, 6 (2): 75-87 (2019)Robust 3D Face Recognition from Low Resolution Images., , and . BIOSIG, volume P-212 of LNI, page 289-298. GI, (2013)Gait Matching by Mapping Wearable to Camera Privacy-Preserving Recordings: Experimental Comparison of Multiple Settings., , , , and . CoDIT, page 338-343. IEEE, (2019)Scan4Reco: Towards the Digitized Conservation of Cultural Heritage Assets via Spatiotemporal (4D) Reconstruction and 3D Printing., , and . GCH, page 53-56. Eurographics Association, (2016)Discovering the Discriminating Power in Patient Test Features Using Visual Analytics: A Case Study in Parkinson's Disease., , , , , , , , , and . AIAI, volume 475 of IFIP Advances in Information and Communication Technology, page 600-610. Springer, (2016)User Acceptance Evaluation of a Gamified Knowledge Sharing Platform for Use in Industrial Environments., , , , , and . Int. J. Serious Games, 6 (2): 89-108 (2019)Modelling of Material Ageing with Generative Adversarial Networks., , and . IVMSP, page 1-5. IEEE, (2018)Event-based unobtrusive authentication using multi-view image sequences., , and . ARTEMIS@ACM Multimedia, page 69-74. ACM, (2010)Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks., , , , , and . GIoTS, page 1-6. IEEE, (2019)