Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Student Learning Experience for SQL Using Automatic Marking., and . CELDA, page 281-288. IADIS, (2004)FPGA Implementation of an Asynchronous Processor with Both Online and Offline Testing Capabilities., , , and . ASYNC, page 128-137. IEEE Computer Society, (2008)A High Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability., , , and . ASYNC, page 163-174. IEEE Computer Society, (2007)Forensic Considerations for the High Efficiency Image File Format (HEIF)., and . Cyber Security, page 1-8. IEEE, (2020)Reducing the Impact of Network Bottlenecks on Remote Contraband Detection., , and . Cyber Security, page 1-7. IEEE, (2018)Security Issues of a Publicly Accessible Cloud Computing Infrastructure., and . TrustCom, page 1210-1216. IEEE Computer Society, (2012)Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)Insider threat detection using principal component analysis and self-organising map., , and . SIN, page 274-279. ACM, (2017)On-chip structures for timing measurement and test., , , , and . Microprocess. Microsystems, 27 (9): 473-483 (2003)A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system., , , and . Cyber Security, page 1-8. IEEE, (2018)