Author of the publication

Applying Security Engineering to Build Security Countermeasures: An Introduction.

, and . PARA, volume 3732 of Lecture Notes in Computer Science, page 957-963. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)An Improved AI-Based Secure M-Trust Privacy Protocol for Medical Internet of Things in Smart Healthcare System., , and . IEEE Internet Things J., 10 (21): 18477-18485 (November 2023)Image Watermarking in Curvelet Domain Using Edge Surface Blocks., , , , , , and . Symmetry, 12 (5): 822 (2020)Linear Correlation-Based Feature Selection for Network Intrusion Detection Model., , , and . SecNet, volume 381 of Communications in Computer and Information Science, page 240-248. Springer, (2013)Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors., , and . SCSS, volume 45 of EPiC Series in Computing, page 63-67. EasyChair, (2017)A Hop-Sensitive Mechanism to Establish Route Optimization in Mobile Networks., , , and . ACN, volume 77 of Communications in Computer and Information Science, page 116-123. (2010)Duplicate Address Detection Table in IPv6 Mobile Networks., and . ACN, volume 77 of Communications in Computer and Information Science, page 109-115. (2010)Feature Extraction and Analysis of Breast Cancer Specimen., , , and . ACN, volume 77 of Communications in Computer and Information Science, page 30-41. (2010)An infrastructurless vehicle blackbox system., , , and . IINTEC, page 1-5. IEEE, (2018)