Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Reduce False Alarms in an Intrusion Detection System., , and . Security and Management, page 127-132. CSREA Press, (2005)Paving the Road Towards Business to Software Unified Modeling Using Extended UML., , and . Software Engineering Research and Practice, page 165-170. CSREA Press, (2004)Retraction notice to "Investigating the efficiency in oil futures market based on GMDH approach" Expert Systems with Applications 36 (2009) 7479-7483., , , and . Expert Syst. Appl., 42 (12): 5401 (2015)Normalized Similarity Index: An adjusted index to prioritize article citations., , , and . J. Informetrics, 7 (1): 91-98 (2013)Cyber-Physical Blockchain Based Secure Platforms for Data and Energy Trading in Multi-Level Electricity Markets., , and . CCECE, page 248-255. IEEE, (2022)A Corrective Integrated Transmission and Distribution Co-Simulation for Scenario Analysis of Different Technology Penetration., , , and . ISGT-Europe, page 680-684. IEEE, (2020)Applying BSUP to Optimize RiskIT Methodology Based on UML 2.0., , and . Software Engineering Research and Practice, page 178-183. CSREA Press, (2008)A New Approach Towards Mature Software Models Through Business to Software Unified Process (BSUP)., , and . IKE, page 370-378. CSREA Press, (2003)Recognizing Tenacious Graphs Is NP-Hard., , and . Ars Comb., (2014)Unrestricted pose-invariant face recognition by sparse dictionary matrix., , and . Image Vis. Comput., (2015)