Author of the publication

Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation.

, , , , , and . Sensors, 19 (2): 293 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of a Vector-based Tracking Loop Receiver in a Pseudolite Navigation System., , , , , , and . Sensors, 10 (7): 6324-6346 (2010)Reuse of JIT Compiled Code in JavaScript Engine., and . J. Web Eng., 11 (4): 337-349 (2012)Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation., , , , , and . Sensors, 19 (2): 293 (2019)HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform., , and . IEEE Access, (2022)LTE RSSI Based Vehicular Localization System in Long Tunnel Environment., , , , and . IEEE Trans. Ind. Informatics, 19 (11): 11102-11114 (November 2023)Smart-Bin Using Ultrawideband Localization to Assist People with Movement Disabilities., , , and . RTCSA, page 259. IEEE Computer Society, (2016)RISK-Sleep: Real-Time Stroke Early Detection System During Sleep Using Wristbands., , , , , and . SMC, page 4333-4339. IEEE, (2018)Driving-PASS: An Automatic Driving Performance Assessment System for Stroke Drivers Based on ANN and SVM., , , , , and . ICARCV, page 1367-1373. IEEE, (2018)A Wearable Sleep Position Tracking System Based on Dynamic State Transition Framework., , , , and . IEEE Access, (2019)Biometric Gait Identification for Exercise Reward System using Smart Earring., , , , and . SenSys, page 367-368. ACM, (2018)