Watson T.
21
Coauthors
5
Documentos
Volumen de publicaciones por año
Cargando gráfico
Año de publicación | Num. Publicaciones |
---|---|
2011 | 1 |
2012 | 2 |
2013 | 1 |
2022 | 1 |
Publicaciones por áreas de conocimiento
Cargando gráfico
Área de conocimiento | Num. Publicaciones |
---|---|
Ciencias de la computación | 5 |
Minería de datos | 1 |
Visión por computadora | 1 |
Red informática | 1 |
Internet de las cosas | 1 |
Análisis de datos | 1 |
Publicaciones por áreas temáticas
Cargando gráfico
Área temática | Num. Publicaciones |
---|---|
Ciencias de la computación | 5 |
Principales fuentes de datos
Origen | Num. Publicaciones |
---|---|
Scopus | 5 |
Google Scholar | 1 |
RRAAE | 0 |
Cargando gráfico
Coautores destacados por número de publicaciones
Coautor | Num. Publicaciones |
---|---|
Luque-Baena R.M. | 4 |
Esteban José Palomo | 4 |
Elizondo D. | 4 |
North J. | 2 |
López-Rubio E. | 1 |
Domínguez E. | 1 |
Jhumka A. | 1 |
Denys A. Flores | 1 |
Butler M. | 1 |
Bradbury M. | 1 |
Cargando gráfico
Top Keywords
Cargando gráfico
Publicaciones del autor
Assessment of geometric features for individual identification and verification in biometric hand systems
ArticleAbstract: This paper studies the reliability of geometric features for the identification of users based on haPalabras claves:Genetic Algorithms, Geometric features, Hand biometrics, User identificationAutores:Elizondo D., Esteban José Palomo, López-Rubio E., Luque-Baena R.M., Watson T.Fuentes:scopusApplication of growing hierarchical SOM for visualisation of network forensics traffic data
ArticleAbstract: Digital investigation methods are becoming more and more important due to the proliferation of digitPalabras claves:data clustering, Data visualisation, Feature Extraction, hierarchical self-organisation, Network forensicsAutores:Elizondo D., Esteban José Palomo, Luque-Baena R.M., North J., Watson T.Fuentes:scopusVisualisation of network forensics traffic data with a self-organising map for qualitative features
Conference ObjectAbstract: Digital crimes are a part of modern life but evidence of these crimes can be captured in network traPalabras claves:Autores:Elizondo D., Esteban José Palomo, Luque-Baena R.M., North J., Watson T.Fuentes:scopusSOM-based techniques towards hierarchical visualisation of network forensics traffic data
Conference ObjectAbstract: Current research is improving the quality and efficiency of digital investigation methods due to thePalabras claves:data clustering, Data visualisation, hierarchical self-organisation, Network forensicsAutores:Domínguez E., Elizondo D., Esteban José Palomo, Luque-Baena R.M., Watson T.Fuentes:scopusThreat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
ArticleAbstract: There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrainPalabras claves:computation offloading, Edge computing, internet of things, resource constrained, threat modelling, trustAutores:Bradbury M., Burton J., Butler M., Denys A. Flores, Jhumka A., Watson T.Fuentes:googlescopus