Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PLS-HECC-based device authentication and key agreement scheme for smart home networks., , , and . Comput. Networks, (2022)DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks., , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (3): 1566-1580 (2021)Security and Privacy in Virtual Reality - A Literature Survey.. CoRR, (2022)Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders., , , , , , , , and . CoRR, (2022)A Stochastic model for RNA splicing., , and . ECC, page 1164-1169. IEEE, (2022)Vulnerabilities and Security Breaches in Cryptocurrencies., , and . SEDA, volume 925 of Advances in Intelligent Systems and Computing, page 288-299. Springer, (2018)Noise in transcriptional, splicing and translational regulation.. CIBCB, page 1-6. IEEE, (2020)A Human Papillomavirus Early Promoter Minimal Model: Viral Population and Stochasticity.. EMBC, page 2471-2474. IEEE, (2020)Analysis of DDoS-Capable IoT Malwares., , , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 807-816. (2017)Inferring causal molecular networks: empirical assessment through a community-based effort, , , , , , , , , and 163 other author(s). Nature Methods, 13 (4): 310--318 (Feb 22, 2016)