Author of the publication

Detecting Low-level Radiation Sources Using Border Monitoring Gamma Sensors.

, , , , and . MFI, page 342-347. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Normalized Statistical Metric Space for Hidden Markov Models., , , , , and . IEEE Trans. Cybern., 43 (3): 806-819 (2013)Inferring Statistically Significant Hidden Markov Models., , , , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1548-1558 (2013)Mobile Network Analysis Using Probabilistic Connectivity Matrices., , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (4): 694-702 (2007)On Bandwidth-Limited Sum-of-Games Problems., , , and . IEEE Trans. Syst. Man Cybern. Part A, 41 (2): 341-349 (2011)Fusion of threshold rules for target detection in wireless sensor networks., , , , , and . ACM Trans. Sens. Networks, 6 (2): 18:1-18:7 (2010)Stochastic Tools for Network Intrusion Detection., and . CoRR, (2017)A Compiler-Based Approach to Data Security., , , and . CC, volume 3443 of Lecture Notes in Computer Science, page 188-203. Springer, (2005)Circumventing keyloggers and screendumps., , , and . MALWARE, page 103-108. IEEE Computer Society, (2013)Masking the Energy Behavior of DES Encryption., , , , , , and . DATE, page 10084-10089. IEEE Computer Society, (2003)Fault Tolerant Algorithms for Network-On-Chip Interconnect., , , , , and . ISVLSI, page 46-51. IEEE Computer Society, (2004)