Author of the publication

Security Vulnerabilities - From Data Analysis to Protection Mechanisms.

, , , and . WORDS Fall, page 331-338. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Speed High-Resolution Low-Distortion CMOS Bootstrapped Switch., , , , and . ISCAS, page 1721-1724. IEEE, (2007)A new low power symmetric folded cascode amplifier by recycling current in 65nm CMOS technology., , and . ASICON, page 820-823. IEEE, (2011)RAID level selection for heterogeneous disk arrays., and . Cluster Computing, 14 (2): 115-127 (2011)Adaptive hinging hyperplanes and its applications in dynamic system identification., , and . Automatica, 45 (10): 2325-2332 (2009)On Stability of Neural Networks by a Lyapunov Functional-Based Approach., , , and . IEEE Trans. on Circuits and Systems, 54-I (4): 912-924 (2007)An ARMA-Model-Based NTF Estimation on Continuous-Time ΔΣ Modulators., , , , and . IEEE Trans. on Circuits and Systems, 62-II (8): 721-725 (2015)Dynamic Linkages between Stock Market Volatility and Macroeconomic Variables: Empirical Evidence Based on China., and . BIFE, page 831-835. IEEE Computer Society, (2009)Transparent Runtime Randomization for Security., , and . SRDS, page 260-. IEEE Computer Society, (2003)Operation optimization for centrifugal chiller plants using continuous piecewise linear programming., , and . SMC, page 1121-1126. IEEE, (2010)Caching and Predicting Branch Sequences for Improved Fetch Effectiveness., , and . IEEE PACT, page 294-302. IEEE Computer Society, (1999)