Author of the publication

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.

, , , , , and . IEEE Communications Magazine, 54 (6): 60-67 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics., , , and . IEEE Consumer Electronics Magazine, 9 (2): 34-40 (2020)Developing Participatory Clothing Shopping Platform for Customer's Participation in Design., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 717-723. Springer, (2018)Next-Generation Access Control for Distributed Control Systems., , , , , , , , and . IEEE Internet Comput., 20 (5): 28-37 (2016)A Study on the RFID and 2D Barcode, and NFC and Performance Improvement., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 773-779. Springer, (2018)A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery., , , and . SEGS@CCS, page 35-40. ACM, (2013)A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface., and . Mob. Inf. Syst., (2018)Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android"., , , and . MobileHCI, page 20:1-20:17. ACM, (2020)Empirical Study on the Development of ESS-Based Electric Propulsion System for a Catamaran USV., , , and . IEEE Access, (2023)GUI-based software modularization through module clustering in edge computing based IoT environments., and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1625-1639 (2022)Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment., and . J. Ambient Intell. Humaniz. Comput., 15 (2): 1411-1421 (February 2024)