Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POSTER: Blackboard-Based Electronic Warfare System.. ACM Conference on Computer and Communications Security, page 1681-1683. ACM, (2015)POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites., , and . ACM Conference on Computer and Communications Security, page 1638-1640. ACM, (2015)Protection from 'Fake News': The Need for Descriptive Factual Labeling for Online Content., , and . Future Internet, 13 (6): 142 (2021)Developing a Framework for Autonomous Control Software for a Human Colony on Mars., , , , , and . EIT, page 515-520. IEEE, (2019)A comparison of techniques for super-resolution evaluation., and . IQSP, volume 8293 of SPIE Proceedings, page 82930Z. SPIE, (2012)Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation., and . TrustCom, page 759-766. IEEE, (2020)Comparative study of fitness function in genetic algorithm for optimal site allocation using Lidar., , and . EIT, page 255-260. IEEE, (2019)Considering the Implications of Artificial Intelligence, Quantum Computing, and Cybersecurity., and . CSCI, page 1080-1082. IEEE, (2022)Evaluation of a Multi-Goal Solver for Use in a Blackboard Architecture.. IJDSST, 6 (1): 1-13 (2014)Graphics Card Based Fuzzing., , and . MASS Workshops, page 111-115. IEEE, (2019)