Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA-based secondary on-board computer system for low-earth-orbit nano-satellite., , , , , and . ATSIP, page 1-6. IEEE, (2017)New Attacks on RSA with Moduli N = p r q., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 352-360. Springer, (2015)Factoring RSA Moduli with Weak Prime Factors., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 361-374. Springer, (2015)Host intrusion detection for long stealthy system call sequences., , and . CIST, page 96-100. IEEE, (2012)A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (9): 7366-7390 (2022)A cognitive map framework to support integrated environmental assessment., , , , and . Environ. Model. Softw., (2016)Third-party source code compliance using early static code analysis., , , , and . CTS, page 132-139. IEEE, (2015)Perturbation effects in orbital elements of CubeSats., , , , and . ATSIP, page 1-6. IEEE, (2017)Link budget analysis for a LEO cubesat communication subsystem., , , , , , , and . ATSIP, page 1-6. IEEE, (2017)Lattice Attacks on the DGHV Homomorphic Encryption Scheme., and . IACR Cryptology ePrint Archive, (2015)