Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach to detection of mobile rogue access points., , , and . Secur. Commun. Networks, 7 (10): 1510-1516 (2014)Finding client-side business flow tampering vulnerabilities., , , , , , and . ICSE, page 222-233. ACM, (2020)SWATShare - A web platform for collaborative research and education through online sharing, simulation and visualization of SWAT models., , , , , and . Environ. Model. Softw., (2016)Design and Implementation of Fuzzing Framework Based on IoT Applications., , and . Wirel. Pers. Commun., 93 (2): 365-382 (2017)Benefits and Limitations of Jupyter-based Scientific Web Applications., , , , , and . e-Science, page 542-550. IEEE, (2022)Open Science via HUBzero: Exploring Five Science Gateways Supporting and Growing their Open Science Communities., , , , , , , , , and 4 other author(s). HICSS, page 1-10. ScholarSpace, (2022)An improved anonymous authentication scheme for distributed mobile cloud computing services., , , , and . Clust. Comput., 22 (Suppl 1): 1595-1609 (2019)Cyber-enabled autocalibration of hydrologic models to support Open Science., , , , , , and . Environ. Model. Softw., (2022)BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service., , , and . ICSE, page 448-459. IEEE, (2023)Hubzero: Community Growth for Four Science Gateways Supporting Open Science., , , , , , , , , and 5 other author(s). Comput. Sci. Eng., 25 (1): 34-42 (January 2023)