Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DigLA - A Digsby log analysis tool to identify forensic artifacts., and . Digital Investigation, 9 (3-4): 222-234 (2013)On Improving the Security of Logic Locking., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 35 (9): 1411-1424 (2016)Provably-Secure Logic Locking: From Theory To Practice., , , , , and . ACM Conference on Computer and Communications Security, page 1601-1618. ACM, (2017)Special Session: Countering IP Security threats in Supply chain., , , , , and . VTS, page 1-9. IEEE, (2019)TTLock: Tenacious and traceless logic locking., , , and . HOST, page 166. IEEE Computer Society, (2017)Forensic Analysis of Digsby Log Data to Trace Suspected User Activities., , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 119-126. Springer, (2012)A granular approach for user-centric network analysis to identify digital evidence., , , , and . Peer-to-Peer Networking and Applications, 8 (5): 911-924 (2015)Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts., , and . IMF, page 142-152. IEEE Computer Society, (2009)ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , and . CoRR, (2019)On-line laboratories for image and two-dimensional signal processing using 2D J-DSP., , and . ICASSP (3), page 785-788. IEEE, (2003)