Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems., , , , and . Inf., 12 (10): 408 (2021)Towards generic memory forensic framework for programmable logic controllers., , , , and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301513 (March 2023)Colorado State Library Talks Virtual Reference. Library Journal, (2005)Data Science & Engineering into Food Science: A novel Big Data Platform for Low Molecular Weight Gelators' Behavioral Analysis., , , and . J. Comput. Sci. Technol., 20 (2): 08 (2020)Trustworthy Data Analysis and Sensor Data Protection in Cyber-Physical Systems., , , , and . SAT-CPS@CODASPY, page 13-22. ACM, (2021)Risk of rapid evolutionary escape from biomedical interventions targeting SARS-CoV-2 spike protein, , , , , , , , , and 1 other author(s). PLOS ONE, 16 (4): 1-17 (April 2021)A hierarchical feature decomposition clustering algorithm for unsupervised classification of document image types., , , and . ICMLA, page 423-428. IEEE Computer Society, (2007)Scratch the workshop and its implications on our world of computing, , and . J. Comput. Sci. Coll., (May 2011)Data Collection in the Palm of Your Hand: A Case Study., , , and . Int. J. Hum. Comput. Interaction, 13 (2): 231-243 (2001)Canvas Considered Helpful?, and . SIGCSE, page 1357. ACM, (2021)