Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Brain-Computer Interface (BCI) and Artificial Intelligence for EEG Signal Analysis., , , and . ACIIDS (Companion), volume 1716 of Communications in Computer and Information Science, page 214-226. Springer, (2022)Security and Scalability in Private Permissionless Blockchain: Problems and Solutions Leading to Creating Consent-as-a-Service (CaaS) Deployment., , and . ICCCI (CCIS Volume), volume 1463 of Communications in Computer and Information Science, page 278-289. Springer, (2021)Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack., , and . IEA/AIE, volume 12144 of Lecture Notes in Computer Science, page 407-418. Springer, (2020)Cloud Solutions for Private Permissionless Blockchain Deployment., , and . Comput. Informatics, (2021)Android Hook Detection Based on Machine Learning and Dynamic Analysis., , , , and . AINA Workshops, volume 1150 of Advances in Intelligent Systems and Computing, page 1321-1329. Springer, (2020)Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart Dialogs., , , , and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 293-305. Springer, (2022)Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems., , and . ATIS, volume 719 of Communications in Computer and Information Science, page 3-13. Springer, (2017)An Empirical Comparison of Steganography and Steganalysis Solutions., , , and . ACIIDS (Companion), volume 1716 of Communications in Computer and Information Science, page 724-736. Springer, (2022)Analysis of Blockchain Selfish Mining Attacks., , , and . ISAT (1), volume 1050 of Advances in Intelligent Systems and Computing, page 231-240. Springer, (2019)Efficient N-Byte Slack Space Hashing in Retrieving and Identifying Partially Recovered Data., and . ICSOFT (1), page 309-312. SciTePress, (2011)