Author of the publication

Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.

, , , and . RACS, page 167-169. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems., , and . IEEE Access, (2019)Temporally coherent video matting., , and . SIGGRAPH Posters, page 77:1. ACM, (2010)Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption., , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 815-823. Springer, (2019)The approximate solutions of fuzzy functional integral equations., , and . Fuzzy Sets and Systems, 110 (1): 79-90 (2000)Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services., , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 133-139. Springer, (2019)Design and Implementation of the Individualized Intelligent Teachable Agent., , , , , , , , , and 2 other author(s). ICNC (1), volume 3610 of Lecture Notes in Computer Science, page 797-805. Springer, (2005)Improved coordinate-based image and video cloning algorithm., and . SIGGRAPH ASIA Posters, page 48:1. ACM, (2009)Optimized image resizing using flow-guided seam carving and an interactive genetic algorithm., , , and . Multimedia Tools Appl., 71 (3): 1013-1031 (2014)Completely generalized strongly quasivariational inequalities for fuzzy mappings., , and . Fuzzy Sets and Systems, 110 (1): 91-99 (2000)Improvement of QR Code Access Control System Based on Lamport Hash Chain., , , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 824-833. Springer, (2019)