Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , and . IEEE Vehicular Technology Magazine, (2013)Multicast source handover scheme based on proxy router discovery., , and . BROADNETS, page 865-874. IEEE, (2005)ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family., , , , , and . PRDC, page 257-262. IEEE, (2018)Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header., , , and . FMEC, page 1-6. IEEE, (2021)Accountable security mechanism based on security service level agreement., , , , , , and . ISCC, page 404-410. IEEE Computer Society, (2013)Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices., , , , and . ISCC, page 274-277. IEEE, (2018)Risk visualization and alerting system: architecture and proof-of-concept implementation., , , , and . SESP@CCS Asia, page 3-10. ACM, (2013)A KEM/DEM-Based Construction for Secure and Anonymous Communication., , , and . COMPSAC Workshops, page 680-681. IEEE Computer Society, (2015)The Usability of Metadata for Android Application Analysis., , , , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 546-554. (2016)Intrinsically Motivated Self-Supervised Deep Sensorimotor Learning for Grasping., , and . IROS, page 3496-3502. IEEE, (2018)