Author of the publication

UML Model Refactoring with Emphasis on Behavior Preservation.

, and . TASE, page 125-128. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model for malware propagation in scale-free networks based on rumor spreading process., and . Comput. Networks, (2016)Business intelligence using machine learning algorithms., and . Multim. Tools Appl., 81 (23): 33233-33251 (2022)Anomaly process detection using negative selection algorithm and classification techniques., and . Evol. Syst., 12 (3): 769-778 (2021)Agent-based simulation of the dynamics of malware propagation in scale-free networks., , and . Simulation, 92 (7): 709-722 (2016)Data mining tools -a case study for network intrusion detection., and . Multim. Tools Appl., 80 (4): 4999-5019 (2021)The SEIRS-C model of information diffusion based on rumour spreading with fuzzy logic in social networks., and . Int. J. Comput. Math., 99 (9): 1918-1940 (2022)Game theory approach for detecting vulnerable data centers in cloud computing network., and . Int. J. Commun. Syst., (2019)A malware propagation model considering software diversity and topology dynamics., , and . ISCISC, page 73-78. IEEE, (2014)Network intrusion detection based on deep learning method in internet of thing., and . J. Reliab. Intell. Environ., 9 (2): 147-159 (June 2023)Machine Learning algorithms for prediction of energy consumption and IoT modeling in complex networks., and . Microprocess. Microsystems, (March 2022)