Author of the publication

Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems.

, , and . ISMICT, page 1-9. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decomposing specifications with concurrent outputs to resolve state coding conflicts in asynchronous logic synthesis., and . DAC, page 830-833. ACM, (2004)CMOS design of the tree arbiter element., and . IEEE Trans. Very Large Scale Integr. Syst., 4 (4): 472-476 (1996)A Theory of Synchrony and Asynchrony., , and . Programming Concepts and Methods, page 459-478. North-Holland, (1990)User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain., , , and . TrustCom, page 87-96. IEEE, (2020)Delay-Insensitive Interface Specification and Synthesis., and . DATE, page 169-173. IEEE Computer Society / ACM, (2000)Sequencer circuits for VLSI programming., and . ASYNC, page 82-90. IEEE Computer Society, (1995)Gate-level modelling and verification of asynchronous circuits using CSPM and FDR.. ASYNC, page 83-94. IEEE Computer Society, (2007)Functional programming with side-effects.. University of Oxford, UK, (1986)British Library, EThOS.Optimal Two-Level Delay - Insensitive Implementation of Logic Functions., and . PATMOS, volume 2451 of Lecture Notes in Computer Science, page 92-100. Springer, (2002)Controllable Delay-Insensitive Processes., and . Fundam. Informaticae, 78 (1): 101-130 (2007)