Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PLS-HECC-based device authentication and key agreement scheme for smart home networks., , , and . Comput. Networks, (2022)DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks., , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (3): 1566-1580 (2021)Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders., , , , , , , , and . CoRR, (2022)Security and Privacy in Virtual Reality - A Literature Survey.. CoRR, (2022)A Stochastic model for RNA splicing., , and . ECC, page 1164-1169. IEEE, (2022)Noise in transcriptional, splicing and translational regulation.. CIBCB, page 1-6. IEEE, (2020)A Human Papillomavirus Early Promoter Minimal Model: Viral Population and Stochasticity.. EMBC, page 2471-2474. IEEE, (2020)Analysis of DDoS-Capable IoT Malwares., , , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 807-816. (2017)Vulnerabilities and Security Breaches in Cryptocurrencies., , and . SEDA, volume 925 of Advances in Intelligent Systems and Computing, page 288-299. Springer, (2018)DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation., , , and . Secur. Commun. Networks, (2018)