Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , and . CoRR, (2019)Correlating messages from multiple IM networks to identify digital forensic artifacts., , , and . Electron. Commer. Res., 14 (3): 369-387 (2014)Development of blind algorithm with automatic gain control., and . Wireless Networks, 26 (4): 2413-2422 (2020)Logic Locking With Provable Security Against Power Analysis Attacks., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (4): 766-778 (2020)Effect of micro/nano-SiO$_2$ on mechanical, thermal, and electrical properties of silicone rubber, epoxy, and EPDM composites for outdoor electrical insulations., , , , and . Turkish J. Electr. Eng. Comput. Sci., (2017)A granular approach for user-centric network analysis to identify digital evidence., , , , and . Peer-to-Peer Netw. Appl., 8 (5): 911-924 (2015)ScanSAT: unlocking obfuscated scan chains., , , , , and . ASP-DAC, page 352-357. ACM, (2019)Towards Provably Secure Logic Locking for Hardening Hardware Security Dissertation Summary: IEEE TTTC E.J. McCluskey Doctoral Thesis Award Competition., and . ITC, page 1-10. IEEE, (2018)On-line laboratories for image and two-dimensional signal processing using 2D J-DSP., , and . ICASSP (3), page 785-788. IEEE, (2003)Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts., , and . IMF, page 142-152. IEEE Computer Society, (2009)