Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities., , and . EuroS&P, page 1160-1178. IEEE, (2023)Programmable Logic Controller Forensics., , , and . IEEE Secur. Priv., 15 (6): 18-24 (2017)Proportional fairness analysis of massive MIMO Two-tier multiuser downlink with subchannel pairing.. Phys. Commun., (2017)Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays., , , , and . TACAS (1), volume 12651 of Lecture Notes in Computer Science, page 113-132. Springer, (2021)Robust Fingerprinting for Relocatable Code., , and . CODASPY, page 219-229. ACM, (2015)Improved Commodity Supply Chain Performance Through AI and Computer Vision Techniques., , , and . IEEE Access, (2024)Analysis of the decoupled uplink downlink technique for varying path loss exponent in multi-tier HetNet., , , and . Telecommun. Syst., 74 (4): 497-510 (2020)Minimal Induced Traffic for Cluster Formation in Wireless Sensor Networks: A Quantitative Analysis., , and . COMSWARE, IEEE, (2007)Control Logic Injection Attacks on Industrial Control Systems., and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 33-48. Springer, (2019)Outage Optimal Resource Allocation for Two-Hop Multiuser Multirelay Cooperative Communication in OFDMA Upstream., and . VTC Spring, page 1-6. IEEE, (2011)