Author of the publication

Simulation of the Movement Behavior of Leopardus Guigna using Random Walkers

, , , and . Applied Mathematics and Sciences: An International Journal (MathSJ ), 8 (2/3/4): 01-17 (December 2021)
DOI: 10.5121/mathsj.2021.8401

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation of the Movement Behavior of Leopardus Guigna using Random Walkers, , , and . Applied Mathematics and Sciences: An International Journal (MathSJ ), 8 (2/3/4): 01-17 (December 2021)Global, regional, and national levels and causes of maternal mortality during 1990–2013: a systematic analysis for the Global Burden of Disease Study 2013, , , , , , , , , and 336 other author(s). The Lancet, (May 2014)Removing artefacts from TMS-EEG recordings using independent component analysis: Importance for assessing prefrontal and motor cortex network properties., , , , , , , and . NeuroImage, (2014)Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags., , , and . SECPerU, page 55-60. IEEE Computer Society, (2007)Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override., , and . SIoT, page 30-39. IEEE, (2017)Source smartphone identification using sensor pattern noise and wavelet transform., , , , , and . ICDP, page 1-6. IET / IEEE, (2013)Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification., and . SSR, volume 11322 of Lecture Notes in Computer Science, page 143-163. Springer, (2018)Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism., , , , and . COINS, page 1-6. IEEE, (2022)What Is Your MOVE: Modeling Adversarial Network Environments., , , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 260-275. Springer, (2020)Investigating the impact of ransomware splash screens., , , and . J. Inf. Secur. Appl., (2021)