Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common Requirements for Web Application Vulnerability Scanners for the Internet of Things., and . ICSSA, page 111. IEEE, (2017)Decoder-Free Sino-Korean Shellcode., , , and . ICSSA, page 75-78. IEEE, (2016)Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks., and . UIC, volume 4611 of Lecture Notes in Computer Science, page 535-544. Springer, (2007)Flow Control Strategy for Flexible Machining and Assembly System., , and . PROLAMAT, volume B-3 of IFIP Transactions, page 577-584. North-Holland, (1992)Detecting truncation point in steady-state simulation using chaos theory., and . WSC, page 353-360. ACM, (1994)Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture., , , , and . EUC, page 359-362. IEEE Computer Society, (2010)Digital Media Art Applying Physical Game Technology Using Gesture Recognition., , and . HCI (29), volume 374 of Communications in Computer and Information Science, page 273-276. Springer, (2013)Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic., , and . ICUIMC, page 597-601. ACM, (2009)Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks., and . IEA/AIE, volume 4570 of Lecture Notes in Computer Science, page 64-73. Springer, (2007)Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks., , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 263-272. Springer, (2007)