Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ANS-based compression and encryption with 128-bit security., , , , , , and . Int. J. Inf. Sec., 21 (5): 1051-1067 (2022)ANS-based Compression and Encryption with 128-bit Security., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Compcrypt - Lightweight ANS-based Compression and Encryption., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 57-71. Springer, (2020)A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms., , , and . IEEE Access, (2023)Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling., , and . IEEE Access, (2020)Pseudorandom Bit Generation with Asymmetric Numeral Systems., , , , , and . IACR Cryptol. ePrint Arch., (2022)Malicious Package Detection using Metadata Information., , , , , , , , , and . CoRR, (2024)A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts., , and . IEEE Access, (2017)Compression Optimality of Asymmetric Numeral Systems., , , , , and . CoRR, (2022)