Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emergence of Persistent Activity States in a Two-Population Neural Field Model for Smooth $\alpha$ -Type External Input., , , and . IEEE Access, (2019)Effect of Alpha-Type External Input on Annihilation of Self-Sustained Activity in a Two Population Neural Field Model., , , , and . IEEE Access, (2019)Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs., , , and . CSR, page 304-311. IEEE, (2021)IDS rule management made easy., and . ECAI, page 1-8. IEEE, (2016)Using Partial Signatures in Intrusion Detection for Multipath TCP., , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 71-86. Springer, (2019)Automated testing of IDS rules., and . ICST Workshops, page 1-2. IEEE Computer Society, (2015)Multipath TCP IDS Evasion and Mitigation., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 265-282. Springer, (2015)Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications., , , and . NTMS, page 1-5. IEEE, (2018)Geological Interpretation of the Deformation Obtained by PSInSAR in Islamabad and Rawalpindi., , , , , and . IGARSS, page 8170-8173. IEEE, (2023)Development and Implementation of a Holistic Flexibility Market Architecture., , , , , , , , , and 2 other author(s). ISGT, page 1-5. IEEE, (2022)