Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A method for detecting arrhythmia using a RR interval from ECG data in U-Health system., , and . ICUIMC, page 15. ACM, (2011)Human Neck's Posture Measurement using a 3-Axis Accelerometer Sensor., , , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 96-109. Springer, (2011)Security Attacks Against the Availability of Low Earth Orbit Satellite Networks., , and . ICNCC, page 64-69. ACM, (2023)Formal Modeling and Verification of Software-Defined Networking with Multiple Controllers., and . TRIDENTCOM, volume 309 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 81-94. Springer, (2019)Improved User Authentication Scheme with User Anonymity for Wireless Communications., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (2): 860-864 (2011)The Research on Vulnerability Analysis in OpenADR for Smart Grid., , and . DARE, volume 8817 of Lecture Notes in Computer Science, page 54-60. Springer, (2014)Formal Modeling and Verification of SDN-OpenFlow., , , , , , and . ICST, page 481-482. IEEE Computer Society, (2013)DDoS attacks detection in the cloud using K-medoids algorithm., and . ICACT, page 91-94. IEEE, (2022)Verification for NFV-enabled network services., , , , , and . ICTC, page 810-815. IEEE, (2015)Process Algebraic Specification of Software Defined Networks., , , , and . CICSyN, page 359-363. IEEE, (2012)