Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of the spatial location of boundary on colour overflow in Gamut conversion., , , , , , , and . Displays, (December 2023)Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD., , , , and . GraMSec@CSF, volume 11720 of Lecture Notes in Computer Science, page 186-202. Springer, (2019)Reliability Analysis of Business Continuity Based on SPN in Information System Security Management., , , and . 3PGCIC, page 232-236. IEEE Computer Society, (2014)Active Contour Integrating Patch-Level and Pixel-Level Features., , , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 353-365. Springer, (2017)