Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7., , , , , and . ECAI, page 1-5. IEEE, (2022)Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting., , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 85-98. IOS Press, (2021)An Adaptive Regenerative Braking Strategy Design Based on Naturalistic Regeneration Performance for Intelligent Vehicles., , , and . IEEE Access, (2023)Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context., , , , , and . SMC, page 1127-1132. IEEE, (2017)Formal Enforcement of Security Policies on Parallel Systems with Risk Integration., and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 133-148. Springer, (2015)FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7., , , , , and . CoRR, (2023)Extreme Gradient Boosting for Cyberpropaganda Detection., , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 99-112. IOS Press, (2021)Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications., , , and . Information, 11 (3): 130 (2020)Using an Intelligent Vision System for Obstacle Detection in Winter Condition., , , , and . VEHITS, page 562-568. SciTePress, (2019)$K$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 321-337. Springer, (2021)