Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Commodity Supply Chain Performance Through AI and Computer Vision Techniques., , , and . IEEE Access, (2024)Analysis of the decoupled uplink downlink technique for varying path loss exponent in multi-tier HetNet., , , and . Telecommun. Syst., 74 (4): 497-510 (2020)Proportional fairness analysis of massive MIMO Two-tier multiuser downlink with subchannel pairing.. Phys. Commun., (2017)Programmable Logic Controller Forensics., , , and . IEEE Secur. Priv., 15 (6): 18-24 (2017)Lemmas for Satisfiability Modulo Transcendental Functions via Incremental Linearization., , , , and . SC-square@SIAM AG, volume 2460 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities., , and . EuroS&P, page 1160-1178. IEEE, (2023)Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays., , , , and . TACAS (1), volume 12651 of Lecture Notes in Computer Science, page 113-132. Springer, (2021)Evaluation of Peer Instruction for Cybersecurity Education., , and . SIGCSE, page 720-725. ACM, (2019)Robust Fingerprinting for Relocatable Code., , and . CODASPY, page 219-229. ACM, (2015)Outage Optimal Resource Allocation for Two-Hop Multiuser Multirelay Cooperative Communication in OFDMA Upstream., and . VTC Spring, page 1-6. IEEE, (2011)