επεξεργασία Πολιορκία Σταθερός dblp ioannis stylios ελεγκτής μεγέθυνση Μισοτροπικός
Yoshua Bengio - Mila
PDF) Redefining Information Systems Security: Viable Information Systems.
PDF) Journal of Computer Science IJCSIS January 2017 Part I.pdf | Journal of Computer Science IJCSIS - Academia.edu
The h-index for Greek origin Computer Scientists & Engineers
The h-index for Greek origin Computer Scientists & Engineers
PDF) Biometrics and e-Identity (e-Passport) in the European Union: End-User Perspectives on the Adoption of a Controversial Innovation
Dynamic interaction in knowledge based systems: An exploratory investigation and empirical evaluation | Request PDF
Stylianos I. Venieris | Home
PDF) A cross media platform for personalized leisure & entertainment: The POLYMNIA approach
PDF) SenGuard: Passive user identification on smartphones using multiple sensors
dblp: Browse Persons
Stylianos I. Venieris | Home
PDF) Detection of facial characteristics based on edge information.
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions
PDF) A Framework for Exploiting Security Expertise in Application Development
dblp.yaml/artmed.bib at master · davidar/dblp.yaml · GitHub
dblp: Browse Persons
PDF) Automatic Detection and Prevention of Cyberbullying | Neel Roy - Academia.edu
PDF) Dynamic Bayesian approach to forecasting
PDF) Incorporating Security Requirements Into the Software Development Process.
PDF) Combining Biometric Evidence for Person Authentication
The h-index for Greek origin Computer Scientists & Engineers
PDF) Using the Lens of Circuits of Power in Information Systems Security Management
PDF) Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives | Liyana Shuib - Academia.edu
PDF) Neural Recognition and Genetic Features Selection for Robust Detection of E-Mail Spam
PDF) Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks.
PDF) On the need for different security methods on mobile phones
PDF) Facial feature detection using distance vector fields