Author of the publication

A Quantitative Methodology for Cloud Security Risk Assessment.

, , and . CLOSER, page 92-103. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework., and . Security and Fault Tolerance in Internet of Things, Springer, (2019)Designing Low-Cost Hardware Accelerators for CE Devices Hardware Matters., , , and . IEEE Consumer Electronics Magazine, 6 (4): 140-149 (2017)Multi-phase watermark for IP core protection., and . ICCE, page 1-3. IEEE, (2018)Audio and Video Technologies: Recent Advances in Consumer Electronics., and . IEEE Consumer Electron. Mag., 7 (5): 26 (2018)A Formal Methodology for Modeling Threats to Enterprise Assets., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 149-166. Springer, (2014)A Quantitative Methodology for Cloud Security Risk Assessment., , and . CLOSER, page 92-103. SciTePress, (2017)Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning., , and . ICCE-Berlin, page 1-3. IEEE, (2019)User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis., and . ISQED, page 289-292. IEEE, (2015)Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints., and . iNIS, page 1-6. IEEE, (2015)Signature Biometric based Authentication of IP Cores for Secure Electronic Systems., and . iSES, page 384-388. IEEE, (2021)