Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Software Platform for Mobile Malware Analysis - A Potential Vision., , , , , , , and . FABULOUS, volume 283 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 431-436. Springer, (2019)Performance evaluation of conventional and MMSE multiuser detection algorithms with different spreading signature codes., , , , , and . EUROCON, page 1-4. IEEE, (2011)Combined use of pattern recognition algorithms for keystroke-based continuous authentication system., , , , and . COMM, page 1-4. IEEE, (2014)Securing an alerting subsystem for a keystroke-based user identification system., , , , and . COMM, page 1-4. IEEE, (2014)Study of millimeter waves in 5G., , and . BlackSeaCom, page 1-4. IEEE, (2021)Location-Based Web System for Geographically Distributed Mobile Teamwork Management., , , and . AWIC, volume 86 of Advances in Intelligent and Soft Computing, page 217-224. Springer, (2011)Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution., , and . ECAI, page 1-6. IEEE, (2023)Circuit with directional coupler properties, in microstrip technology, for 2.4GHz ISM band applications., and . BlackSeaCom, page 1-6. IEEE, (2021)Security issues in most popular content management systems., , , and . COMM, page 277-280. IEEE, (2016)Models for configurable mechanisms in multimedia Q0S management - simulation study., , and . ESM, page 535-538. SCS Europe, (2000)