Cited By
View all- Martinez-Mascorro GCarlos Ortiz-Bayliss JTerashima-Marin H(2020)Detecting Suspicious Behavior on Surveillance Videos: Dealing with Visual Behavior Similarity between Bystanders and Offenders2020 IEEE ANDESCON10.1109/ANDESCON50619.2020.9272175(1-7)Online publication date: 13-Oct-2020
- Gutierrez CSpafford EBagchi SYurek T(2018)Reactive redundancy for data destruction protection (R2D2)Computers and Security10.1016/j.cose.2017.12.01274:C(184-201)Online publication date: 1-May-2018
- Bacs AGiuffrida CGrill BBos HOssowski S(2016)SlickProceedings of the 31st Annual ACM Symposium on Applied Computing10.1145/2851613.2851795(2033-2040)Online publication date: 4-Apr-2016
- Show More Cited By