Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overshadow PLC to Detect Remote Control-Logic Injection Attacks., , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 109-132. Springer, (2019)Telecommunications systems engineering using SDL., , and . North-Holland, (1989)Asterisk, , and . O'Reilly, Sebastopol, CA, (2005)Asterisk - the future of telephony: join the open source PBX revolution: covers Asterisk 1.4 (2. ed.)., , and . O'Reilly, (2007)Asterisk - the future of telephony: join the open source PBX revolution., , and . O'Reilly, (2005)A Dataset of Open-Source Android Applications., , , , , , and . MSR, page 522-525. IEEE Computer Society, (2015)Accessibility in mind? A nationwide study of K-12 Web sites in the United States., and . First Monday, (2019)Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems., , and . Digit. Investig., (2020)MVDR Beamformer Design by Imposing Unit Circle Roots Constraints for Uniform Linear Arrays., , and . IEEE Trans. Signal Process., (2021)AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors., , , , , , , , , and 4 other author(s). IEEE Big Data, page 1620-1629. IEEE, (2023)