Author of the publication

Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).

, and . RAID, volume 5230 of Lecture Notes in Computer Science, page 415-416. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing., , , , and . IEEE Internet Things J., 8 (14): 11758-11772 (2021)Protecting e-commerce agents from defamation., and . Electron. Commer. Res. Appl., 3 (1): 21-38 (2004)Alert correlation using artificial immune recognition system., , and . Int. J. Bio Inspired Comput., 4 (3): 181-195 (2012)The state of the art in critical infrastructure protection: a framework for convergence., and . Int. J. Crit. Infrastructures, 4 (3): 215-244 (2008)The Bottom-Up Freezing: An Approach to Neural Engineering., and . AI, volume 2056 of Lecture Notes in Computer Science, page 317-324. Springer, (2001)A Novel Approach for Social Behavior Analysis of the Blogosphere., , , and . Canadian AI, volume 5032 of Lecture Notes in Computer Science, page 356-367. Springer, (2008)Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack., and . ICBC, volume 12991 of Lecture Notes in Computer Science, page 59-73. Springer, (2021)Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy., , , and . ICCST, page 1-8. IEEE, (2019)CIC-AB: Online ad blocker for browsers., , , and . ICCST, page 1-7. IEEE, (2017)