Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach, and . Springer, (2022)The Modular Subset-Sum Problem and the size of deletion correcting codes., and . Des. Codes Cryptogr., 90 (8): 1721-1734 (2022)The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective., , and . CoRR, (2022)Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning., , , and . ACM Comput. Surv., 55 (12): 262:1-262:34 (December 2023)An Approach to Exploiting Skewed Associative Memories in Avionics Systems., and . ICPADS, page 517-522. IEEE Computer Society, (2002)Root causing, detecting, and fixing flaky tests: State of the art and future roadmap., , , and . Softw. Pract. Exp., 51 (5): 851-867 (2021)The Application of CAM Memories in Real-time Systems., and . PDPTA, page 1897-1903. CSREA Press, (2002)Proactive Detection of Query-based Adversarial Scenarios in NLP Systems., , , , and . AISec@CCS, page 103-113. ACM, (2022)SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning., , , and . PST, page 1-8. IEEE, (2021)Modeling and evaluating the time overhead induced by BER in COMA multiprocessors., and . J. Syst. Archit., 48 (13-15): 377-385 (2003)