Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)Two Challenging Domains.. ACM Comput. Surv., 28 (4es): 12 (1996)Runtime Protection of Real-time Critical Control Applications against Known Threats., , , and . IEEE Des. Test, 37 (6): 88-95 (2020)Evolutionary design of complex software (EDCS)., and . ACM SIGSOFT Softw. Eng. Notes, 20 (5): 18-22 (1995)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , and . IEEE Access, (2018)AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)The Innovative Applications of Artificial Intelligence Conference: Past and Future.. AI Magazine, 17 (4): 15-20 (1996)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)