Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS., , , , , and . Comput. Informatics, 38 (2): 343-366 (2019)Information Hiding into OBJ Format File Using Vector Steganography Techniques., , , and . SACI, page 91-96. IEEE, (2018)Intrusion Detection Architecture Utilizing Graphics Processors., , and . Acta Informatica Pragensia, 1 (1): 50-59 (2012)Comparison of Filter Techniques for Two-Step Feature Selection., , , , , , , , and . Comput. Informatics, 36 (3): 597-617 (2017)Android Access Control Extension., , and . Acta Informatica Pragensia, 4 (3): 310-317 (2015)A non-intrusive Smart metering system: Analytics and simulation of power consumption., , , , and . Concurr. Comput. Pract. Exp., (2020)Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology., , , , , , and . Comput. Informatics, 36 (1): 113-139 (2017)Agent-Based Model of the Spectrum Auctions with Sensing Imperfections in Dynamic Spectrum Access Networks., , , , , , , , and . Comput. Informatics, 36 (5): 1041-1062 (2017)Security sandbox based on RBAC model., , and . SACI, page 75-80. IEEE, (2016)Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns., , and . Towards Intelligent Engineering and Information Technology, volume 243 of Studies in Computational Intelligence, Springer, (2009)