Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development., and . CoG, page 1-4. IEEE, (2019)D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Weakly Holomorphic Modular Forms in Prime Power Levels of Genus Zero., and . Integers, (2018)D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 893-907 (2021)Urbanization, Urbanism, and Urbanity in an African City. (2013)A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems., , and . ISSE, page 1-6. IEEE, (2019)Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems., and . ISSE, page 1-6. IEEE, (2020)Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity., and . BESC, page 1-6. IEEE, (2020)Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness., , , , and . SSCI, page 1146-1153. IEEE, (2020)Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging., , , , , , , and . SSCI, page 1138-1145. IEEE, (2020)