Author of the publication

Plagiarism detection and prevention techniques in engineering education.

, and . EWME, page 1-3. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early detection of system-level anomalous behaviour using hardware performance counters., , and . DATE, page 485-490. IEEE, (2018)Course on secure hardware design of silicon chips.. IET Circuits Devices Syst., 11 (4): 304-309 (2017)Cell Flipping with Distributed Refresh for Cache Ageing Minimization., , and . ATS, page 98-103. IEEE, (2018)On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology., , , , , and . ECCTD, page 1-4. IEEE, (2020)A Methodology for Cybersecurity Risk Assessment in Supply Chains., , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 26-41. Springer, (2023)Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator., , , , and . AsianHOST, page 1-5. IEEE, (2023)A Method for Swift Selection of Appropriate Approximate Multipliers for CNN Hardware Accelerators., , , and . ISCAS, page 1-5. IEEE, (2024)A Security Assessment tool for Quantum Threat Analysis., , , , , , , and . CoRR, (2024)Analysis of BTI aging of level shifters., , and . IOLTS, page 17-18. IEEE, (2016)A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design., , and . IVSW, page 52-55. IEEE, (2018)