Author of the publication

A new approach to recognize activities in smart environments based on cooperative game theory.

, , and . INISTA, page 334-338. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Paving the Road Towards Business to Software Unified Modeling Using Extended UML., , and . Software Engineering Research and Practice, page 165-170. CSREA Press, (2004)An Approach to Reduce False Alarms in an Intrusion Detection System., , and . Security and Management, page 127-132. CSREA Press, (2005)Retraction notice to "Investigating the efficiency in oil futures market based on GMDH approach" Expert Systems with Applications 36 (2009) 7479-7483., , , and . Expert Syst. Appl., 42 (12): 5401 (2015)Normalized Similarity Index: An adjusted index to prioritize article citations., , , and . J. Informetrics, 7 (1): 91-98 (2013)Cyber-Physical Blockchain Based Secure Platforms for Data and Energy Trading in Multi-Level Electricity Markets., , and . CCECE, page 248-255. IEEE, (2022)A Corrective Integrated Transmission and Distribution Co-Simulation for Scenario Analysis of Different Technology Penetration., , , and . ISGT-Europe, page 680-684. IEEE, (2020)Applying BSUP to Optimize RiskIT Methodology Based on UML 2.0., , and . Software Engineering Research and Practice, page 178-183. CSREA Press, (2008)Recognizing Tenacious Graphs Is NP-Hard., , and . Ars Comb., (2014)A New Approach Towards Mature Software Models Through Business to Software Unified Process (BSUP)., , and . IKE, page 370-378. CSREA Press, (2003)NFIDS: a neuro-fuzzy intrusion detection system., , and . ICECS, page 348-351. IEEE, (2003)