Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks., and . TrustCom/ISPA/IUCC, page 636-643. IEEE Computer Society, (2013)Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey., , , , and . CoRR, (2019)POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects., , , , and . ACM Conference on Computer and Communications Security, page 2539-2541. ACM, (2017)A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement., , , , , and . Quantum Information Processing, 17 (7): 162 (2018)Mobile Agents - The Right Vehicle for Distributed Sequential Computing., , , and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 575-586. Springer, (2002)Identifying Drawbacks in Malicious PDF Detectors., , , and . FNSS, volume 878 of Communications in Computer and Information Science, page 128-139. Springer, (2018)Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations., , and . WDFIA, page 76-86. Plymouth University, UK, (2012)Testing Digital Forensic Software Tools Used in Expert Testimony., and . Handbook of Research on Computational Forensics, Digital Crime, and Investigation, IGI Global, (2010)Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR., , and . IMF, page 59-68. IEEE Computer Society, (2013)Toward Automatic Data Distribution for Migrating Computations., , , , and . ICPP, page 27. IEEE Computer Society, (2007)