Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Layered IoT System Design Towards End-to-End Secure Communication., , , , , and . IECON, page 2213-2220. IEEE, (2020)Robust scareware image detection., , , , and . ICASSP, page 2920-2924. IEEE, (2013)ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection., , , and . USENIX Security Symposium, USENIX Association, (2011)Sufficient Criteria and Sharp Geometric Conditions for Observability in Banach Spaces., , and . SIAM J. Control. Optim., 58 (4): 2639-2657 (2020)Observability for Non-autonomous Systems., , , and . SIAM J. Control. Optim., 61 (1): 315-341 (February 2023)Automating Malware Scanning Using Workflows., , , and . CCGRID, page 562-567. IEEE Computer Society, (2009)Identifying and Analyzing Web Server Attacks., , , , , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 151-161. Springer, (2008)Measurement Study on Malicious Web Servers in the .nz Domain., , , , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 8-25. Springer, (2009)Single-trial coupling of EEG and fMRI reveals the involvement of early anterior cingulate cortex activation in effortful decision making., , , , , , , , , and 2 other author(s). NeuroImage, 42 (1): 158-168 (2008)Long-Term Study of Honeypots in a Public Cloud., , , , , , , , and . DSN (Supplements), page 1-4. IEEE, (2022)