The Impact of Quantum Computing in Present Cryptography V Mavroeidis, K Vishi, M Zych, A Jøsang International Journal of Advanced Computer Science and Applications (IJACSA …, 2018 | 392 | 2018 |
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR N Gruschka, V Mavroeidis, K Vishi, M Jensen 2018 IEEE International Conference on Big Data, 1-7, 2018 | 186 | 2018 |
An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics K Vishi, V Mavroeidis 10th Norwegian Information Security Conference (NISK 2017), 124-134, 2017 | 39 | 2017 |
Multimodal Biometric Authentication Using Fingerprint and Iris Recognition in Identity Management K Vishi, SY Yayilgan Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth …, 2013 | 33 | 2013 |
Firearm detection and segmentation using an ensemble of semantic neural networks A Egiazarov, V Mavroeidis, FM Zennaro, K Vishi 2019 European Intelligence and Security Informatics Conference (EISIC), 70-77, 2019 | 30 | 2019 |
A Framework for Data-Driven Physical Security and Insider Threat Detection V Mavroeidis, K Vishi, A Jøsang 2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018 | 27 | 2018 |
Attack analysis of face recognition authentication systems using fast gradient sign method A Musa, K Vishi, B Rexha Applied artificial intelligence 35 (15), 1346-1360, 2021 | 19 | 2021 |
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History A Bucko, K Vishi, B Krasniqi, B Rexha Computers 12 (4), 18, 2023 | 13 | 2023 |
D., M., & Jøsang, A.(2018). The impact of quantum computing on present cryptography V Mavroeidis, K Vishi International Journal of Advanced Computer Science and Applications 9 (3), 2018 | 11 | 2018 |
A New Approach for Multi-Biometric Fusion Based on Subjective Logic K Vishi, A Jøsang International Conference on Internet of Things and Machine Learning (IML …, 2017 | 11 | 2017 |
Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications R Thaqi, K Vishi, B Rexha Journal of Applied Security Research 17 (3), 2022 | 6 | 2022 |
Privacy and Ethical Considerations of Smart Environments: A Philosophical Approach on Smart Meters K Vishi Computational Science and Its Applications - ICCSA 2023 Workshops. Lecture …, 2023 | 4 | 2023 |
Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms. B Rexha, R Thaqi, A Mazrekaj, K Vishi International Journal of Online & Biomedical Engineering 19 (18), 2023 | | 2023 |
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints B Rexha, A Musa, K Vishi, E Martiri | | 2023 |
CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML S Selimi, B Rexha, K Vishi International Journal of Information and Computer Security (IJICS) 20 (5), 1, 2023 | | 2023 |