Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects., , , , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 385-388. Chapman & Hall, (1997)Issues and Techniques for Redacting PDF Files., , , , , and . J. Digital Forensic Practice, 2 (3): 113-116 (2008)Temporal Lobes as Combinatory Engines for both Form and Meaning., , , and . CL4LC@COLING 2016, page 186-191. The COLING 2016 Organizing Committee, (2016)Automatic Generation of Attack Scripts from Attack Graphs., , , , and . ICDIS, page 267-274. IEEE, (2018)Competitive Learning Environment for Cyber-Physical System Security Experimentation., , , , , and . ICDIS, page 211-218. IEEE, (2018)Entropy Reduction correlates with temporal lobe activity., , , and . CMCL@EACL, page 1-10. Association for Computational Linguistics, (2017)Text Genre and Training Data Size in Human-like Parsing., , , , and . EMNLP/IJCNLP (1), page 5845-5851. Association for Computational Linguistics, (2019)Public Telephone Network Vulnerabilities., , , , and . DBSec, volume 215 of IFIP Conference Proceedings, page 151-164. Kluwer, (2001)On Modeling Computer Networks for Vulnerability Analysis., , , , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 233-244. Kluwer, (2002)Reranking for Sentence Boundary Detection in Conversational Speech., , , , , , , , , and 1 other author(s). ICASSP (1), page 545-548. IEEE, (2006)