Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS attacks detection in the cloud using K-medoids algorithm., and . ICACT, page 91-94. IEEE, (2022)Hierarchical System Schedulability Analysis Framework Using UPPAAL., , , and . IEICE Transactions, 99-D (8): 2172-2176 (2016)Improved User Authentication Scheme with User Anonymity for Wireless Communications., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (2): 860-864 (2011)A method for detecting arrhythmia using a RR interval from ECG data in U-Health system., , and . ICUIMC, page 15. ACM, (2011)Formal Modeling and Verification of Software-Defined Networking with Multiple Controllers., and . TRIDENTCOM, volume 309 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 81-94. Springer, (2019)Human Neck's Posture Measurement using a 3-Axis Accelerometer Sensor., , , , , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 96-109. Springer, (2011)Security Attacks Against the Availability of Low Earth Orbit Satellite Networks., , and . ICNCC, page 64-69. ACM, (2023)The Research on Vulnerability Analysis in OpenADR for Smart Grid., , and . DARE, volume 8817 of Lecture Notes in Computer Science, page 54-60. Springer, (2014)Formal Modeling and Verification of SDN-OpenFlow., , , , , , and . ICST, page 481-482. IEEE Computer Society, (2013)A Verification Method of SDN Firewall Applications., , , , , and . IEICE Trans. Commun., 99-B (7): 1408-1415 (2016)