Author of the publication

Quantification of microbial species in solid state fermentation samples using signature genomic sequences.

, , , , and . BIBM, page 927-932. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securely computing an approximate median in wireless sensor networks., , , and . SecureComm, page 6. ACM, (2008)Privacy-preserving robust data aggregation in wireless sensor networks., , , , , and . Security and Communication Networks, 2 (2): 195-213 (2009)Secure Data Aggregation in Wireless Sensor Networks., , , and . IEEE Trans. Information Forensics and Security, 7 (3): 1040-1052 (2012)A game inspired defense mechanism against distributed denial of service attacks., , and . Security and Communication Networks, 7 (12): 2389-2404 (2014)On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks., , , , and . SpringSim, page 159. SCS/ACM, (2010)Practical Always-on Taint Tracking on Mobile Devices., , , , and . HotOS, USENIX Association, (2015)Secure median computation in wireless sensor networks., , , and . Ad Hoc Networks, 7 (8): 1448-1462 (2009)Static Analysis for Security Vetting of Android Apps., , and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 375-404. Springer, (2018)Quantification of microbial species in solid state fermentation samples using signature genomic sequences., , , , and . BIBM, page 927-932. IEEE Computer Society, (2017)Game theory for cyber security., , and . CSIIRW, page 34. ACM, (2010)