Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Literature Review on RAMS analysis for critical infrastructures protection., , and . Int. J. Crit. Infrastructure Prot., (2021)Authentication of Underwater Assets., , , and . CoRR, (2022)Design of a neural network for recognition and classification of computer viruses., , , and . Comput. Secur., 14 (5): 435-448 (1995)Developing metrics to assess the effectiveness of cybersecurity awareness program., , and . J. Cybersecur., (2022)SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture., , , , , , , , , and 23 other author(s). Digit., 1 (4): 173-187 (December 2021)Perceptions of Cyber Security Risk of the Norwegian Advanced Metering Infrastructure., , and . ICISSP, page 187-194. SCITEPRESS, (2024)WYK: Mobile Device Authentication Using the User's Address Book., , and . ETAA, volume 13136 of Lecture Notes in Computer Science, page 1-16. Springer, (2021)Model for network behaviour under viral attack., , , and . Comput. Commun., 19 (2): 124-132 (1996)Underwater tracking of a maneuvering target using time delay measurements., , and . Signal Process., 41 (1): 17-29 (1995)Adaptive deconvolution of seismic signals-performance, computational analysis, parallelism., , and . IEEE Trans. Acoust. Speech Signal Process., 36 (11): 1715-1734 (1988)