Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PC-RED for IPv6: Algorithm and Performance Analysis., and . ICC, page 5581-5585. IEEE, (2008)Topology Density Map for Urban Data Visualization and Analysis., , , , and . CoRR, (2020)Wired/wireless network based technologies for remote monitoring and control.. Loughborough University, UK, (2014)British Library, EThOS.Integrating Technical Approaches, Organisational Issues, and Human Factors in Security Risk Assessment by Organising Security Related Questions., , and . ICEIS (3-1), page 311-315. (2008)Insider threats in information security categories and approaches., , and . ICAC, page 1-6. IEEE, (2015)Design and Implementation of Instantly Deployable Localization System in Remote Areas., , , and . GreenCom, page 265-268. IEEE Computer Society, (2012)Ultrawideband-Based Real-Time Positioning With Cascaded Wireless Clock Synchronization Method., , , and . IEEE Internet Things J., 11 (9): 16731-16745 (May 2024)A Reinforcement Adversarial Framework Targeting Endogenous Functional Safety in ICS: Applied to Tennessee Eastman Process., , and . ICCAE, page 187-192. IEEE, (2024)A Word and Local Feature Aware Network for Chinese Spoken Language Understanding., , , and . IJCNN, page 1-7. IEEE, (2024)Anomaly detection using isomorphic analysis for false data injection attacks in industrial control systems., , , , and . J. Frankl. Inst., 361 (13): 107000 (2024)