Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A granular approach for user-centric network analysis to identify digital evidence., , , , and . Peer-to-Peer Netw. Appl., 8 (5): 911-924 (2015)Effect of micro/nano-SiO$_2$ on mechanical, thermal, and electrical properties of silicone rubber, epoxy, and EPDM composites for outdoor electrical insulations., , , , and . Turkish J. Electr. Eng. Comput. Sci., (2017)Logic Locking With Provable Security Against Power Analysis Attacks., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (4): 766-778 (2020)On-line laboratories for image and two-dimensional signal processing using 2D J-DSP., , and . ICASSP (3), page 785-788. IEEE, (2003)Towards Provably Secure Logic Locking for Hardening Hardware Security Dissertation Summary: IEEE TTTC E.J. McCluskey Doctoral Thesis Award Competition., and . ITC, page 1-10. IEEE, (2018)Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts., , and . IMF, page 142-152. IEEE Computer Society, (2009)JamBIT: RL-based framework for disrupting adversarial information in battlefields., , , , , and . Ad Hoc Networks, (2025)A triple-shallow CNN with genetic algorithm channel selection method for classifying EEG complex limb movements., , , , , , and . Biomed. Signal Process. Control., (2025)ScanSAT: unlocking obfuscated scan chains., , , , , and . ASP-DAC, page 352-357. ACM, (2019)Ultra compact, quadratic power proxies for multi-core processors., , and . ICECS, page 954-957. IEEE, (2013)