Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance electromechanical direct-drive actuators for flight vehicles., , and . ACC, page 1345-1350. IEEE, (2001)Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Pattern recognition by immunocomputing., and . IEEE Congress on Evolutionary Computation, page 938-943. IEEE, (2002)A Pspice Optimal Design Tool Utilizing Genetic Optimization., , and . Modelling and Simulation, page 372-379. IASTED/ACTA Press, (2003)Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation., , , , , and . Journal of Intelligent and Robotic Systems, 84 (1-4): 107-120 (2016)Detecting Malicious Codes by the Presence of Their "Gene of Self-replication"., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 195-205. Springer, (2003)Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 54-75. Springer, (2005)Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization., , and . Security and Management, page 375-385. CSREA Press, (2010)Large-scale Reconfigurable Virtual Testbed for Information Security Experiments., and . TRIDENTCOM, page 1-9. IEEE, (2007)Immunocomputing: Principles and Applications, , and . Springer Verlag, (2003)