Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new universal test for bit strings., and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 311-319. Springer, (1996)A probability distribution function for investigating node infection and removal times., and . Trans. Emerg. Telecommun. Technol., (2020)Worm infectious probability distribution with back-to-origin model., and . IET Commun., 11 (13): 2101-2109 (2017)Malware Dynamic Analysis Evasion Techniques: A Survey., , , and . CoRR, (2018)Malware Dynamic Analysis Evasion Techniques: A Survey., , , and . ACM Comput. Surv., 52 (6): 126:1-126:28 (2020)A smart fuzzing method for detecting heap-based vulnerabilities in executable codes., , and . Secur. Commun. Networks, 9 (18): 5098-5115 (2016)Efficient module 2n+1 multiplication schemes for IDEA., and . ISCAS, page 653-656. IEEE, (2000)An effective node-removal method against P2P botnets., and . Comput. Networks, (2020)Smart fuzzing method for detecting stack-based buffer overflow in binary codes., , and . IET Softw., 10 (4): 96-107 (2016)A Construction for One Way Hash Functions and Pseudorandom Bit Generators., and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 431-445. Springer, (1991)