Home

Függelék bázis Feléleszt dblp ioannis stylios Sokféleség tengeralattjáró csak így tovább

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

Yoshua Bengio - Mila
Yoshua Bengio - Mila

dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub
dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub

Dynamic interaction in knowledge based systems: An exploratory  investigation and empirical evaluation | Request PDF
Dynamic interaction in knowledge based systems: An exploratory investigation and empirical evaluation | Request PDF

PDF) Automatic Detection and Prevention of Cyberbullying | Neel Roy -  Academia.edu
PDF) Automatic Detection and Prevention of Cyberbullying | Neel Roy - Academia.edu

Ioannis Paparrizos's research works | École Polytechnique Fédérale de  Lausanne, Lausanne (EPFL) and other places
Ioannis Paparrizos's research works | École Polytechnique Fédérale de Lausanne, Lausanne (EPFL) and other places

PDF) Using the Lens of Circuits of Power in Information Systems Security  Management
PDF) Using the Lens of Circuits of Power in Information Systems Security Management

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

Ioannis Paparrizos's research works | École Polytechnique Fédérale de  Lausanne, Lausanne (EPFL) and other places
Ioannis Paparrizos's research works | École Polytechnique Fédérale de Lausanne, Lausanne (EPFL) and other places

PDF) Adoption of Biometric Authentication Systems: Implications for  Research and Practice in the Deployment of End-User Security Systems
PDF) Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems

PDF) A Critical Approach to Privacy Research in Ubiquitous Environments –  Issues and Underlying Assumptions
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions

PDF) Incorporating Security Requirements Into the Software Development  Process.
PDF) Incorporating Security Requirements Into the Software Development Process.

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub
crosstex-dbgen/acmcs.xtx at master · el33th4x0r/crosstex-dbgen · GitHub

PDF) Neural Recognition and Genetic Features Selection for Robust Detection  of E-Mail Spam
PDF) Neural Recognition and Genetic Features Selection for Robust Detection of E-Mail Spam

PDF) Elaborating Quantitative Approaches for IT Security Evaluation
PDF) Elaborating Quantitative Approaches for IT Security Evaluation

dblp: Browse Persons
dblp: Browse Persons

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

PDF) A Critical Approach to Privacy Research in Ubiquitous Environments –  Issues and Underlying Assumptions
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions

PDF) Dynamic Bayesian approach to forecasting
PDF) Dynamic Bayesian approach to forecasting

The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers

Stylianos I. Venieris | Home
Stylianos I. Venieris | Home

PDF) A cross media platform for personalized leisure & entertainment: The  POLYMNIA approach
PDF) A cross media platform for personalized leisure & entertainment: The POLYMNIA approach