Author of the publication

Network Distribution of Security Policies via Ant-like Foraging Behavior.

, , and . ICIW, page 64. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NextVC2 - A next generation virtual world command and control., and . MILCOM, page 1-6. IEEE, (2012)Detecting Emulated Environments., , , , and . International Journal of Software Engineering and Knowledge Engineering, 22 (7): 927-944 (2012)Malware: Troy revisited.. Comput. Secur., 18 (2): 105-108 (1999)Malware Shall Greatly Increase ...., and . IEEE Secur. Priv., 7 (6): 69-71 (2009)Moving-Target Defenses for Computer Networks., and . IEEE Secur. Priv., 12 (2): 73-76 (2014)Swarming computer security: an experiment in policy distribution., , and . SIS, page 436-439. IEEE, (2005)Suppressing the Spread of Email Malcode using Short-term Message Recall., , , and . J. Comput. Virol., 1 (1-2): 4-12 (2005)Danger theory and collaborative filtering in MANETs., , , , , , and . J. Comput. Virol., 5 (4): 345-355 (2009)The future of virus detection.. Inf. Secur. Tech. Rep., 9 (2): 19-26 (2004)Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks., , , , , and . EANN, volume 43 of Communications in Computer and Information Science, page 485-494. (2009)