Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated identity management for protecting users from ID theft., , and . Digital Identity Management, page 77-83. ACM, (2005)Certificate-less user authentication with consent., , and . Digital Identity Management, page 11-16. ACM, (2007)Large-Scale Network-Traffic-Identification Method with Domain Adaptation., , , and . WWW (Companion Volume), page 109-110. ACM / IW3C2, (2020)High-Performance Inverter Based on Shaft Acceleration Torque for AC Drives., , and . IEEE Trans. Ind. Electron., 60 (1): 66-77 (2013)FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment., , , and . IEICE Trans. Inf. Syst., 87-D (12): 2610-2617 (2004)A comparative study of structured and text-oriented analysis and design methodologies., , , and . J. Syst. Softw., 28 (1): 69-75 (1995)Balanced Score Propagation for Botnet Detection., , , and . ICC, page 2357-2362. IEEE, (2022)RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data., , , and . APSEC, page 432-436. IEEE, (2022)Message from the IWSC 2015 Workshop Organizers., , , , and . COMPSAC Workshops, page 453. IEEE Computer Society, (2015)SamE: Sampling-based Embedding for Learning Representations of the Internet., , , and . GLOBECOM, page 1-6. IEEE, (2021)