Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural processing of targets in visible, multispectral IR and SAR imagery., , , , , , , and . Neural Networks, 8 (7-8): 1029-1051 (1995)CoCoT: Collaborative Contact Tracing., , and . CODASPY, page 175-186. ACM, (2024)Detection of injected, dynamically generated, and obfuscated malicious code., , , and . WORM, page 76-82. ACM Press, (2003)IEEE SecDev 2016: Prioritizing Secure Development., , , , and . IEEE Secur. Priv., 14 (4): 82-84 (2016)Computing on masked data: a high performance method for improving big data veracity., , , , , , and . HPEC, page 1-6. IEEE, (2014)Improving Intrusion Detection Performance using Keyword Selection and Neural Networks., and . Recent Advances in Intrusion Detection, (1999)Catching MPC Cheaters: Identification and Openability., , and . IACR Cryptol. ePrint Arch., (2016)The Real Cost of Software Errors., and . IEEE Secur. Priv., 7 (2): 87-90 (2009)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , and . CSF, page 412-427. IEEE, (2022)Robust keys from physical unclonable functions., , , and . HOST, page 88-92. IEEE Computer Society, (2014)