Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new method for pixel classification for rice variety identification using spectral and time series data from Sentinel-2 satellite imagery., , , , , , , and . Comput. Electron. Agric., (2022)Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework., , , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-57. Springer, (2019)An EEG-Driven Framework for Emotion Recognition During Gameplay., , , , , and . ICACS, page 1-6. IEEE, (2024)Formal Analysis of Oscillatory Behaviors in Biological Regulatory Networks: An Alternative Approach., , and . CS2Bio, volume 299 of Electronic Notes in Theoretical Computer Science, page 85-100. Elsevier, (2013)On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy., , , , , and . IEEE Access, (2024)Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms., , , and . Future Gener. Comput. Syst., (2021)Optimal Feature-Centric Approach for EEG-Based Human Emotion Identification., , , , , and . ICACS, page 1-6. IEEE, (2024)A Survey on COVID-19 Data Analysis Using AI, IoT, and Social Media., , , , , and . Sensors, 23 (12): 5543 (2023)Cyber Resilience-by-Construction: Modeling, Measuring & Verifying., , and . SafeConfig@CCS, page 9-14. ACM, (2015)Formal Approach for Resilient Reachability based on End-System Route Agility., , , , , and . MTD@CCS, page 117-127. ACM, (2016)