Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of CAM Memories in Real-time Systems., and . PDPTA, page 1897-1903. CSREA Press, (2002)SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning., , , and . PST, page 1-8. IEEE, (2021)Proactive Detection of Query-based Adversarial Scenarios in NLP Systems., , , , and . AISec@CCS, page 103-113. ACM, (2022)The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective., , and . CoRR, (2022)The Modular Subset-Sum Problem and the size of deletion correcting codes., and . Des. Codes Cryptogr., 90 (8): 1721-1734 (2022)Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning., , , and . ACM Comput. Surv., 55 (12): 262:1-262:34 (December 2023)Root causing, detecting, and fixing flaky tests: State of the art and future roadmap., , , and . Softw. Pract. Exp., 51 (5): 851-867 (2021)An Approach to Exploiting Skewed Associative Memories in Avionics Systems., and . ICPADS, page 517-522. IEEE Computer Society, (2002)Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach, and . Springer, (2022)Secure UAV (Drone) and the Great Promise of AI., , , , and . ACM Comput. Surv., 56 (11): 286:1-286:37 (November 2024)