Languages
Traore, Issa.
Overview
Works: | 2 works in 3 publications in 1 languages |
---|
Titles
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments = Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings /
by:
SpringerLink (Online service); Ahmed, Sherif Saad.; Woungang, Isaac.; Traore, Issa.; Malik, Yasir.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information security practices = emerging threats and perspectives /
by:
Awad, Ahmed.; SpringerLink (Online service); Woungang, Isaac.; Traore, Issa.
(Language materials, printed)
Machine learning techniques for gait biometric recognition = using the ground reaction force /
by:
Mason, James Eric.; SpringerLink (Online service); Woungang, Isaac.; Traore, Issa.
(Language materials, printed)
Intelligent, secure, and dependable systems in distributed and cloud environments = first International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017 : proceedings /
by:
Woungang, Isaac.; Traore, Issa.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Awad, Ahmed.
(Language materials, printed)
Biometric-Based Physical and Cybersecurity Systems
by:
SpringerLink (Online service); Woungang, Isaac.; Traore, Issa.; Obaidat, Mohammad S.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Subjects
Software Engineering.
Systems and Data Security.
Biometrics.
Signal, Image and Speech Processing.
Artificial intelligence.
Computer Communication Networks.
Machine learning.
Security Science and Technology.
Signal processing.
Communications Engineering, Networks.
Computer networks
Information Systems Applications (incl. Internet).
Computer Science.
Information Systems Applications (incl. Internet)
Speech processing systems.
Computer communication systems.
Biometrics (Biology).
Application software.
Information Systems and Communication Service.
Biometric identification.
Artificial Intelligence.
Personal Computing.
Data encryption (Computer science).
Cryptology.
Cloud computing
System safety.
Engineering.
User Interfaces and Human Computer Interaction.
Computer security.
Image processing.