William J. Buchanan

Orcid: 0000-0003-0809-3523

Affiliations:
  • Edinburgh Napier University, School of Computing, UK


According to our database1, William J. Buchanan authored at least 183 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.
IEEE Internet Things J., November, 2024

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec., February, 2024

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024

Review of Generative AI Methods in Cybersecurity.
CoRR, 2024

vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election.
CoRR, 2024

DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity.
CoRR, 2024

TIPS: Threat Sharing Information Platform for Enhanced Security.
CoRR, 2024

RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.
IEEE Access, 2024

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.
IEEE Access, 2024

Transforming EU Governance: The Digital Integration Through EBSI and GLASS.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.
Proceedings of the 2024 4th International Conference on Robotics and Control Engineering, 2024

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024

2023
An omnidirectional approach to touch-based continuous authentication.
Comput. Secur., May, 2023

Hamming distributions of popular perceptual hashing techniques.
Forensic Sci. Int. Digit. Investig., March, 2023

A framework for live host-based Bitcoin wallet forensics and triage.
Forensic Sci. Int. Digit. Investig., March, 2023

Attacking Windows Hello for Business: Is It What We Were Promised?
Cryptogr., March, 2023

A Blockchain Framework in Post-Quantum Decentralization.
IEEE Trans. Serv. Comput., 2023

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Using Social Media & Sentiment Analysis to Make Investment Decisions.
Future Internet, 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
CoRR, 2023

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023

Majority Voting Approach to Ransomware Detection.
CoRR, 2023

Towards The Creation Of The Future Fish Farm.
CoRR, 2023

CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Review of the NIST Light-Weight Cryptography Finalists.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

Scalable Multi-domain Trust Infrastructures for Segmented Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities.
Proceedings of the Big Data Technologies and Applications, 2023

TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022

HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
Sensors, 2022

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.
Sensors, 2022

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
Entropy, 2022

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022

NapierOne: A modern mixed file data set alternative to Govdocs1.
Digit. Investig., 2022

The Future of Integrated Digital Governance in the EU: EBSI and GLASS.
CoRR, 2022

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.
J. Cybersecur. Priv., April, 2021

PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform.
Softw. Impacts, 2021

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
Sensors, 2021

A Comparative Analysis of Honeypots on Different Cloud Platforms.
Sensors, 2021

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021

Privacy and Trust Redefined in Federated Machine Learning.
Mach. Learn. Knowl. Extr., 2021

FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures.
J. Parallel Distributed Comput., 2021

BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond.
IEEE Internet Things J., 2021

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports.
CoRR, 2021

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.
CoRR, 2021

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.
CoRR, 2021

Browsers' Private Mode: Is It What We Were Promised?
Comput., 2021

Differential area analysis for ransomware attack detection within mixed file datasets.
Comput. Secur., 2021

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021

A privacy-preserving distributed platform for COVID-19 vaccine passports.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.
Sensors, 2020

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.
Remote. Sens., 2020

Energy demand forecasting of buildings using random neural networks.
J. Intell. Fuzzy Syst., 2020

Scenario-based creation and digital investigation of ethereum ERC20 tokens.
Digit. Investig., 2020

Evaluation of live forensic techniques in ransomware attack mitigation.
Digit. Investig., 2020

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.
CoRR, 2020

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.
CoRR, 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting.
CoRR, 2020

Fast Probabilistic Consensus with Weighted Votes.
CoRR, 2020

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction.
CoRR, 2020

An authentication protocol based on chaos and zero knowledge proof.
CoRR, 2020

Privacy-Preserving Passive DNS.
Comput., 2020

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).
IEEE Access, 2020

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.
IEEE Access, 2020

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.
IEEE Access, 2020

A Distributed Trust Framework for Privacy-Preserving Machine Learning.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum.
Proceedings of the Intelligent Computing, 2020

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.
Proceedings of the 2020 IEEE International Conference on Software Architecture Companion, 2020

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Privacy-preserving Surveillance Methods using Homomorphic Encryption.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Trust-based Ecosystem to Combat Fake News.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour.
Proceedings of the IEEE Intl Conf on Dependable, 2020

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Recent Advances and Trends in Lightweight Cryptography for IoT Security.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT.
IEEE Trans. Comput. Soc. Syst., 2019

Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment".
Secur. Commun. Networks, 2019

Deriving ChaCha20 key streams from targeted memory analysis.
J. Inf. Secur. Appl., 2019

IoT Forensics: Amazon Echo as a Use Case.
IEEE Internet Things J., 2019

A Forensic Audit of the Tor Browser Bundle.
Digit. Investig., 2019

Decrypting live SSH traffic in virtual environments.
Digit. Investig., 2019

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device.
CoRR, 2019

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime.
CoRR, 2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge.
CoRR, 2019

Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0.
CoRR, 2019

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019

A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019

Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Building the Future: Tokenization, Blockchain and Citizen-focused Systems.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019

2018
Distance Measurement Methods for Improved Insider Threat Detection.
Secur. Commun. Networks, 2018

Impact of cyberattacks on stock performance: a comparative study.
Inf. Comput. Secur., 2018

Analysis of the adoption of security headers in HTTP.
IET Inf. Secur., 2018

Forensics study of IMO call and chat app.
Digit. Investig., 2018

Machine learning and semantic analysis of in-game chat for cyberbullying.
Comput. Secur., 2018

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study.
Comput. J., 2018

Requirements for 5G based telemetric cardiac monitoring.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Privacy Parameter Variation Using RAPPOR on a Malware Dataset.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.
Secur. Commun. Networks, 2017

A methodology for the security evaluation within third-party Android Marketplaces.
Digit. Investig., 2017

Sticky policies approach within cloud computing.
Comput. Secur., 2017

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

Performance evaluation of a fragmented secret share system.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
A RAM triage methodology for Hadoop HDFS forensics.
Digit. Investig., 2016

Evaluation of TFTP DDoS amplification attack.
Comput. Secur., 2016

Numerical encoding to Tame SQL injection attacks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

HI-risk: A method to analyse health information risk intelligence.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

2015
The Future Internet: A World of Secret Shares.
Future Internet, 2015

Fast contraband detection in large capacity disk drives.
Digit. Investig., 2015

RESCUE: Resilient Secret Sharing Cloud-Based Architecture.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secret shares to protect health records in Cloud-based infrastructures.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
"I am Spartacus": privacy enhancing technologies, collaborative obfuscation and privacy as a public good.
Artif. Intell. Law, 2014

2013
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services.
Mob. Networks Appl., 2013

Approaches to the classification of high entropy file fragments.
Digit. Investig., 2013

Monitoring information security risks within health care.
Comput. Secur., 2013


Schutz der Anonymität als Gemeinschaftsaufgabe - eine neue Generation von PETs?
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

2012
E-Health: Chances and Challenges of Distributed, Service oriented Architectures.
J. Cyber Secur. Mobil., 2012

Formal security policy implementations in network firewalls.
Comput. Secur., 2012

A new efficient distributed route discovery for wireless mobile ad hoc networks.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012

Computational data protection law: trusting each other offline and online.
Proceedings of the Legal Knowledge and Information Systems, 2012

2011
Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform.
Int. J. Inf. Technol. Syst. Approach, 2011

An Integrated Cloud-based Healthcare Infrastructure.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

DACAR Platform for eHealth Services Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
<i>Ad hoc</i> routing metrics and applied weighting for QoS support.
Int. J. Parallel Emergent Distributed Syst., 2010

Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems.
J. Syst. Softw., 2010

Interagency data exchange protocols as computational data protection law.
Proceedings of the Legal Knowledge and Information Systems, 2010

2009
Protecting mobile agents from external replay attacks.
J. Syst. Softw., 2009

2008
Ad-hoc Routing Metrics and Applied Weighting for QoS support.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Mass Customisation through Personalised Brochures: The Role of Emerging Technologies.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2006
NetHost-sensor: Monitoring a target host's application via system calls.
Inf. Secur. Tech. Rep., 2006

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.
Comput. Secur., 2006

Correlation between academic and skills-based tests in computer networks.
Br. J. Educ. Technol., 2006

Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing.
Ad Hoc Networks, 2006

Investigating False Positive Reduction in HTTP via Procedure Analysis.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

An auto-Configurable, and, Adaptable, Metric-driven Cluster-head Organisation for Hybrid Multi-hop Routing.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

2005
Critical analysis and error determination of locating-finding techniques in GSM.
Int. J. Mob. Commun., 2005

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Agent-based Forensic Investigations with an Integrated Framework.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

2004
Migration of Mobile Agents in Ad-hoc, Wireless Networks.
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004

2003
MARIAN: A Framework Using Mobile Agents for Routing in Ad-Hoc Networks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks.
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003

2002
An Intelligent Agent Security Intrusion System.
Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), 2002

The Complete Handbook of the Internet
Springer, ISBN: 978-0-306-48331-8, 2002

2001
An Agent-Based Bayesian Forecasting Model for Enhanced Network Security.
Proceedings of the 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 2001

Advanced PC architecture.
Addison-Wesley-Longman, ISBN: 978-0-201-39858-8, 2001

2000
Truly Distributed Control Systems using Fieldbus Technology.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Software Agents and Computer Network Security.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Enhancing Network Management using Mobile Agents.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Computer busses - design and application.
Arnold, ISBN: 978-0-340-74076-7, 2000

1996
Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing.
PhD thesis, 1996


  Loading...