Author of the publication

Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions

, , , , , and . Proceeding of the Sixth IEEE Conference on Network Architecture and Information System Security (SAR/SSI 2011), (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial., , and . Technique et Science Informatiques, 21 (4): 423-425 (2002)GOLIATH: an Extensible Model-Based Environment to Develop User Interfaces., , and . CADUI, page 95-104. Kluwer, (2004)Une méthode dirigée par les modèles pour le développement multi-agents., and . INFORSID, page 365-381. (2007)Traffic Behavioral Simulation in Urban and Suburban - Representation of the Drivers' Environment., , , and . PAAMS, volume 155 of Advances in Intelligent and Soft Computing, page 115-125. Springer, (2012)A Multi-agent Homophily-Based Approach for Community Detection in Social Networks., , and . ICTAI, page 501-505. IEEE Computer Society, (2014)CPU load prediction using neuro-fuzzy and Bayesian inferences., , , and . Neurocomputing, 74 (10): 1606-1616 (2011)An Adaptive Approach for the Exploration-Exploitation Dilemma for Learning Agents., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 316-325. Springer, (2005)Mixture of ANFIS systems for CPU load prediction in metacomputing environment., , , and . Future Gener. Comput. Syst., 26 (7): 1003-1011 (2010)Influence maximization through user interaction modeling., , , , and . SAC, page 1888-1890. ACM, (2020)A hybrid agent model: a reactive and cognitive behavior.. ISADS, page 25-32. IEEE Computer Society, (1997)