Author of the publication

Pervasive Management for Ubiquitous Networks and Services - Report on NOMS 2008.

, , , and . J. Netw. Syst. Manag., 16 (3): 317-321 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic risk-based access control architecture for cloud computing., , and . NOMS, page 1-9. IEEE, (2014)Accounting management based service environment in a TINA architecture., , , and . ICC, page 2094-2099. IEEE, (2001)Extending TINA with Secure On-Line Accounting Services., , , and . J. Netw. Syst. Manag., 11 (4): 379-397 (2003)Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments., , and . Comput. Electr. Eng., (2022)Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing., and . CoRR, (2022)A Survey of Large Language Models in Cybersecurity., and . CoRR, (2024)Composition of a DIDS by integrating heterogeneous IDSs on grids., , , and . MGC@Middleware, page 12. ACM, (2006)Improving Cloud Computing Virtual Machines Balancing through Hosts and Virtual Machines Similarities., , and . SERVICES, page 76-85. IEEE Computer Society, (2017)Formal design of a telecommunications networks management system., , , , and . ISCC, page 146-150. IEEE Computer Society, (1997)Proactive network management using remote monitoring and artificial intelligence techniques., , , and . ISCC, page 167-171. IEEE Computer Society, (1997)