Author of the publication

Employing Fuzzy Cognitive Maps to support environmental policy development.

, , and . FUZZ-IEEE, page 1-8. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factoring RSA Moduli with Weak Prime Factors., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 361-374. Springer, (2015)Host intrusion detection for long stealthy system call sequences., , and . CIST, page 96-100. IEEE, (2012)New Attacks on RSA with Moduli N = p r q., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 352-360. Springer, (2015)FPGA-based secondary on-board computer system for low-earth-orbit nano-satellite., , , , , and . ATSIP, page 1-6. IEEE, (2017)Design and Implementation of an Environmental Decision Support System: tools, attributes and challenges., , and . EnviroInfo, page 629-636. BIS-Verlag, (2014)Employing Fuzzy Cognitive Maps to support environmental policy development., , and . FUZZ-IEEE, page 1-8. IEEE, (2015)Power budget analysis for a LEO polar orbiting nano-satellite., , , , , , , , and . ATSIP, page 1-6. IEEE, (2017)Applications of Neural Network-Based AI in Cryptography., and . Cryptogr., 7 (3): 39 (July 2023)Link budget analysis for a LEO cubesat communication subsystem., , , , , , , and . ATSIP, page 1-6. IEEE, (2017)Third-party source code compliance using early static code analysis., , , , and . CTS, page 132-139. IEEE, (2015)