Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"NetPhone"-Reintegrating the net phone., and . CrownCom, page 545-548. IEEE, (2007)Preventive information flow control through a mechanism of split addresses., , and . SIN, page 1-8. ACM, (2016)Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model., , , and . AINA Workshops, page 431-436. IEEE Computer Society, (2010)Mobile augmented reality learning tool to simulate experts' perspectives in the field., , and . UbiComp, page 609-610. ACM, (2012)A Model of Basal Ganglia in Saccade Generation., , , and . ICANN (1), volume 6352 of Lecture Notes in Computer Science, page 282-290. Springer, (2010)Modeling Basal Ganglia for Understanding Parkinsonian Reaching Movements., , , , , and . Neural Comput., 23 (2): 477-516 (2011)An empirical property-based model for vulnerability analysis and evaluation., , , and . APSCC, page 40-45. IEEE, (2009)A Self-correcting Information Flow Control Model for the Web-Browser., , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 285-301. Springer, (2016)Quantitative Evaluation of Related Web-Based Vulnerabilities., , , and . SSIRI (Companion), page 118-125. IEEE Computer Society, (2010)An empirical vulnerability remediation model., , , and . WCNIS, page 376-380. IEEE, (2010)