Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCADA security in the light of Cyber-Warfare., , , , and . Comput. Secur., 31 (4): 418-436 (2012)Attribution of Cyber Attacks on Industrial Control Systems., , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 3 (7): e3 (2016)A Statistical Design Approach Using Fixed and Variable Width Transconductors for Positive-Feedback Gain-Enhancement OTAs., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (6): 1966-1977 (2017)Patterns of somatic mutation in human cancer genomes, , , , , , , , , and 56 other author(s). Nature, 446 (7132): 153--158 (March 2007)Event-based Object Detection and Tracking for Space Situational Awareness., , , and . CoRR, (2019)Nauta OTA in a second-order continuous-time delta-sigma modulator., , , , , and . MWSCAS, page 849-852. IEEE, (2014)Performance Optimization Study of the Neuromorphic Radiation Anomaly Detector., , , , , , , , and . ICONS, page 13:1-13:7. ACM, (2023)A 1.2V 2-bit phase interpolator for 65nm CMOS., , , , and . ISCAS, page 2039-2042. IEEE, (2012)Subthreshold operation of Nauta's operational transconductance amplifier., , , , and . NEWCAS, page 1-4. IEEE, (2015)A 0.3mm2 10-b 100MS/s pipelined ADC using Nauta structure op-amps in 180nm CMOS., , , , , , and . ISCAS, page 1833-1836. IEEE, (2013)