Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Issue: Performance evaluation of communications in distributed systems and Web based service architectures., and . Concurr. Comput. Pract. Exp., 25 (5): 605-607 (2013)Guest Editorial: Distributed Simulation, Virtual Environments and Real-time Applications., and . Concurr. Comput. Pract. Exp., 21 (11): 1419-1421 (2009)Biological Inspired Based Intrusion Detection Models for Mobile Telecommunication Systems., , , and . Handbook of Bioinspired Algorithms and Applications, Chapman and Hall/CRC, (2005)Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II., , , and . IPDPS, page 146. IEEE Computer Society, (2003)A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations., , , , and . IPDPS, IEEE Computer Society, (2005)Formal design of a telecommunications networks management system., , , , and . ISCC, page 146-150. IEEE Computer Society, (1997)Special issue: mobility management in wireless and mobile networks., and . Wirel. Commun. Mob. Comput., 4 (6): 593-594 (2004)Neural Fraud Detection in Mobile Phone Operations., and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 636-644. Springer, (2000)Behavior-Based Intrusion Detection in Mobile Phone Systems., and . J. Parallel Distributed Comput., 62 (9): 1476-1490 (2002)Security management against cloned cellular telephones., , , and . ICON, page 356-363. IEEE, (1999)