Author of the publication

Investigation of Hemoglobin/Gold Nanoparticle Heterolayer on Micro-Gap for Electrochemical Biosensor Application.

, , , , , and . Sensors, 16 (5): 660 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascade Damage Estimation Model for Internet Attacks., , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 163-164. Springer, (2006)The Value Gap Model: Value-Based Requirements Elicitation., , , and . CIT, page 885-890. IEEE Computer Society, (2007)An Odyssey Towards Best SCM Practices: The Big Picture., , and . SCM, volume 1167 of Lecture Notes in Computer Science, page 231-238. Springer, (1996)Security Risk Vector for Quantitative Asset Assessment., , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 274-283. Springer, (2005)A Security Risk Analysis Model for Information Systems., , , , , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 505-513. Springer, (2004)Effective Appliance Selection by Complementary Context Feeding in Smart Home System., , and . SEUS, volume 4761 of Lecture Notes in Computer Science, page 233-242. Springer, (2007)Defending Battery Exhaustion Attacks on Mobile Systems., , and . COMPSAC (2), page 347-352. IEEE Computer Society, (2009)978-0-7695-3726-9.Micro interaction metrics for defect prediction., , , , and . SIGSOFT FSE, page 311-321. ACM, (2011)Cyber Threat Trend Analysis Model Using HMM., , , , and . IAS, page 177-182. IEEE Computer Society, (2007)Effective Security Safeguard Selection Process for Return on Security Investment., , and . APSCC, page 668-673. IEEE Computer Society, (2008)