Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cluster Validity Through Graph-based Boundary Analysis., and . IKE, page 204-210. CSREA Press, (2004)Human Factor and Its Identification in Manufacturing Prediction., and . DIISM, volume 168 of IFIP, page 367-374. Springer, (2002)Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection., and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 18-32. (2006)Self-Similar Characteristic of Traffic in Current Metro Area Network., , , , and . LANMAN, page 176-181. IEEE, (2007)Minimum-Latency Data Gathering Scheduling in Multi-Channel Wireless Sensor Networks Using Only Secure Links., , , and . MSN, page 170-175. IEEE, (2019)Effect of Static Bifurcation on Logical Stochastic Resonance in a Symmetric Bistable System., , , and . Int. J. Bifurc. Chaos, 31 (16): 2150246:1-2150246:16 (2021)Effects of Different Fast Periodic Excitations on the Pitchfork Bifurcation and Vibrational Resonance., , , , and . Int. J. Bifurc. Chaos, 30 (6): 2050092:1-2050092:14 (2020)A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation., , , and . Wirel. Commun. Mob. Comput., (2021)Effect of stimulation sites on the performance of electromagnetic middle ear implant: A finite element analysis., , , , , , and . Comput. Biol. Medicine, (2020)Mining TCP/IP packets to detect stepping-stone intrusion., and . Comput. Secur., 26 (7-8): 479-484 (2007)