Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA Security: From Features to Capabilities to Trusted Systems., and . DAC, page 154:1-154:4. ACM, (2014)FPGA Security: Motivations, Features, and Applications., and . Proc. IEEE, 102 (8): 1248-1265 (2014)Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser., , and . J. Digit. Forensics Secur. Law, 12 (1): 15-30 (2017)Enhancing Free-Living Fall Risk Assessment: Contextualizing Mobility Based IMU Data., , , , , , and . Sensors, 23 (2): 891 (January 2023)Evaluation of an English language phoneme-based imagined speech brain computer interface with low-cost electroencephalography., , , , , and . Frontiers Neuroinformatics, (March 2023)Using geometric properties of topographic manifold to detect and track eyes for human-computer interaction., , and . ACM Trans. Multim. Comput. Commun. Appl., 3 (4): 3:1-3:20 (2007)Network and device forensic analysis of Android social-messaging applications., , , , and . Digit. Investig., (2015)Preliminary forensic analysis of the Xbox One., , , and . Digit. Investig., 11 (Supplement 2): S57-S65 (2014)Authenticated encryption for FPGA bitstreams., , and . FPGA, page 83-86. ACM, (2011)Interactive lighting design for multi-device virtual environments., , and . SIGGRAPH Research Posters, page 36. ACM, (2006)