Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing & Evaluating 'Nutrition Facts' for Online Content., , and . Cyber Security, page 1-8. IEEE, (2020)Graphics Card Based Fuzzing., , and . MASS Workshops, page 111-115. IEEE, (2019)Super-resolution terrain map enhancement for navigation based on satellite imagery.. Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 8301 of SPIE Proceedings, page 83010J. SPIE, (2012)Simulation and Analysis of Self-Replicating Robot Decision-Making Systems., and . Comput., 10 (1): 9 (2021)Consideration of the Need for Quantum Grid Computing., and . CoRR, (2021)Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks.. SmartCloud, page 148-153. IEEE, (2020)Determining the Impact of Cybersecurity Failures During and Attributable to Pandemics and Other Emergency Situations., , and . AIPR, page 1-6. IEEE, (2020)Increasing Trust in Artificial Intelligence with a Defensible AI Technique.. AIPR, page 1-7. IEEE, (2022)Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs., , , and . ICL (2), volume 917 of Advances in Intelligent Systems and Computing, page 632-643. Springer, (2018)Zone based hybrid approach for clustering and data collection in wireless sensor networks., and . CONIELECOMP, page 1-8. IEEE, (2017)