Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Threat Intelligence for SDL., , , , and . SecDev, page 137. IEEE Computer Society, (2018)Sparse signal representation for MIMO radar imaging., , , , and . ACSCC, page 609-613. IEEE, (2008)High Accuracy Navigation for the Mass Market - the FLAMINGO Initiative., , , , , , , , , and 5 other author(s). ENC, page 1-10. IEEE, (2020)Towards Diagram-Based Editing of Ontologies., and . Diagrams, volume 10871 of Lecture Notes in Computer Science, page 699-703. Springer, (2018)A Two-port GFSK Direct Modulator for Wideband Applications at 5.8 GHz., , , , , , and . ISCAS, page 2128-2131. IEEE, (2007)A low-noise frequency synthesizer for infrastructure applications., , , , , and . ISSCC, page 250-251. IEEE, (2010)Assessing pre-pandemic carbon footprint of diet transitions in UK nations and regions., , , , , , and . Int. J. Prod. Res., 61 (18): 6115-6130 (September 2023)A Threat Intelligence Tool for the Security Development Lifecycle., , , , and . ISEC, page 19:1-19:5. ACM, (2019)Understanding Interaction Models: Improving Empirical Analyses, , and . Political Analysis, 14 (1): 63--82 (2006)The impact of monetary expansion with terms of trade effects and trade in securities, and . Journal of International Economics, 11 (1): 61--77 (February 1981)