Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes., , , , and . Int. J. Inf. Sec., 20 (4): 461-473 (2021)Inter-FPGA Routing for Partially Time-Multiplexing Inter-FPGA Signals on Multi-FPGA Systems with Various Topologies., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (12): 2572-2583 (2015)Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak., , and . Open Identity Summit, volume P-325 of LNI, page 87-98. Gesellschaft für Informatik e.V., (2022)Handling conditional preferences in recommender systems, , , and . IUI '09: Proceedingsc of the 13th international conference on Intelligent user interfaces, page 407--412. New York, NY, USA, ACM, (2008)Siamese-structure Deep Neural Network Recognizing Changes in Facial Expression According to the Degree of Smiling., , , and . ICPR, page 4605-4612. IEEE, (2020)Cubistic Representation for Real-Time 3D Shape and Pose Estimation of Unknown Rigid Object., and . ICCV Workshops, page 522-529. IEEE Computer Society, (2013)Theoretical and Experimental Analysis of Traveling Salesman Walk Problem., and . APCCAS, page 241-244. IEEE, (2021)A fast chip-scale power estimation method for large and complex LSIs based on hierarchical analysis., and . ISCAS (1), page 628-631. IEEE, (2005)Video Contents Acquisition and Editing for Conversation Scene., , , and . KES, volume 3213 of Lecture Notes in Computer Science, page 401-410. Springer, (2004)Implementation of WS-Security and Its Performance Improvements., , , and . ICWS, page 256-264. CSREA Press, (2003)