Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SRS-based automatic secure device pairing on audio channels., , and . ICITST, page 1-6. IEEE, (2010)Hierarchical control and learning of a foraging CyberOctopus., , , , , , , and . CoRR, (2023)Modelling Weblog Success: Case of Korea., , and . J. Univers. Comput. Sci., 15 (8): 1589-1606 (2009)Integration of evolutional BOMs for design of ship outfitting equipment., , and . Comput. Aided Des., 44 (3): 253-273 (2012)Success factors of online services in Kathmandu, Nepal: an empirical analysis., , and . Int. J. Bus. Inf. Syst., 18 (4): 422-436 (2015)Do Hackers Seek Variety? An Empirical Analysis of Website Defacements., , , and . ICIS, Association for Information Systems, (2012)A physics-informed, vision-based method to reconstruct all deformation modes in slender bodies., , , , , , , and . ICRA, page 4810-4817. IEEE, (2022)A comparative study of cyberattacks., , and . Commun. ACM, 55 (3): 66-73 (2012)Gamification: A New Paradigm for Online User Engagement., , , and . ICIS, Association for Information Systems, (2012)Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android., , , and . ISSRE Workshops, page 36-39. IEEE Computer Society, (2017)