Michael Hart

According to our database1, Michael Hart authored at least 14 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Emulation of Quantum Error-Correction on an FPGA device.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

2017
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Predicting Cyber Threats with Virtual Security Products.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Improving Scalability of Personalized Recommendation Systems for Enterprise Knowledge Workers.
IEEE Access, 2016

2015
Access Prediction for Knowledge Workers in Enterprise Data Repositories.
Proceedings of the ICEIS 2015, 2015

2014
A National Single Indicator for Schools in England: Helping Parents Make Informed Decisions.
Proceedings of the Key Competencies in ICT and Informatics. Implications and Issues for Educational Professionals and Management, 2014

2011
Text Classification for Data Loss Prevention.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

PhorceField: a phish-proof password ceremony.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis.
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference, 19-24 June, 2011, Portland, Oregon, USA, 2011

2010
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010.
Proceedings of the CLEF 2010 LABs and Workshops, 2010

2009
iTag: a personalized blog tagger.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Usable Privacy Controls for Blogs.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2007
A Hierarchical Clustering Method in Wireless Ad Hoc Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

1998
Corporate liability for employee use of the internet and E-mail: Steps to take to reduce the risks.
Comput. Law Secur. Rev., 1998


  Loading...