Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Ransomware using Support Vector Machines., , and . ICPP Workshops, page 1:1-1:6. ACM, (2018)Seed Selection Procedure for LFSR-Based Random Pattern Generators., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (12): 3063-3071 (2003)Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs., , , , and . PRDC, page 284-291. IEEE Computer Society, (2017)Hybrid BIST Using Partially Rotational Scan., , , , and . Asian Test Symposium, page 379-384. IEEE Computer Society, (2001)An Experimental Study on Latch Up Failure of CMOS LSI., , and . SSIRI, page 215-216. IEEE Computer Society, (2008)Analysis of Read and Write Availability for Generalized Hybrid Data Replication Protocol., , , , , and . PRDC, page 143-150. IEEE Computer Society, (2004)RFID Tag Grouping Protocols Made Private., , and . DSN Workshops, page 105-106. IEEE Computer Society, (2017)The effect of three-dimensional culture on the ameloblastic differentiation of dental epithelial cells., , , , , , , , and . MHS, page 1-2. IEEE, (2016)Analysis of Probabilistic Trapezoid Protocol for Data Replication., , , , and . Inf. Media Technol., 3 (3): 498-511 (2008)A seed selection procedure for LFSR-based random pattern generators., , , , and . ASP-DAC, page 869-874. ACM, (2003)