Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC., , and . J. Signal Process. Syst., 71 (2): 111-121 (2013)A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC., , and . IIH-MSP, page 818-821. IEEE Computer Society, (2008)Protection of Binding Update Message in Mobile IPv6., , , and . EMS, page 444-447. IEEE, (2012)A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review., , , , and . Multim. Tools Appl., 81 (11): 15171-15203 (2022)The Evolution of Android Malware and Android Analysis Techniques., , , , and . ACM Comput. Surv., 49 (4): 76:1-76:41 (2017)The rise of "malware": Bibliometric analysis of malware study., , , and . J. Netw. Comput. Appl., (2016)A survey of secure protocols in Mobile IPv6., , , and . J. Netw. Comput. Appl., (2014)Mobile Botnet Attacks: A Thematic Taxonomy., , and . WorldCIST (2), volume 276 of Advances in Intelligent Systems and Computing, page 153-164. Springer, (2014)Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform., , and . ICDAR, page 91-95. IEEE Computer Society, (2005)Best Path Cluster-Based Routing Protocol for Wireless Sensor Networks., , and . UKSim, page 663-667. IEEE, (2013)