Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-power, high-throughput deblocking filter for H.264/AVC., , , , , and . SoC, page 93-98. IEEE, (2010)A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories., , and . ITNG, page 534-539. IEEE Computer Society, (2015)Analyzing Engineers Writing for Non-engineers., and . TALE, page 281-286. IEEE, (2020)JOP-plus - A processor for efficient execution of java programs extended with GALS concurrency., , and . ASP-DAC, page 17-22. IEEE, (2012)A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application., , , , , , and . IEEE Access, (2022)Memory management of safety-critical hard real-time systems designed in SystemJ., , , and . Microprocess. Microsystems, (2019)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval., and . DMIN, page 619-625. CSREA Press, (2008)On Wide-Area Control of Solar-Integrated DAE Models of Power Grids., , and . ACC, page 4495-4500. IEEE, (2023)Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks., , , , , , and . Symmetry, 16 (5): 605 (May 2024)