From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An artificial immune based intrusion detection model for computer and telecommunication systems., , , и . Parallel Comput., 30 (5-6): 629-646 (2004)A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks., , , и . LCN, стр. 697-704. IEEE Computer Society, (2008)On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-Commerce., , , , , и . ICPADS (2), стр. 525-528. IEEE Computer Society, (2005)Archcollect: A Set of Components Towards Web Users' Interactions., , , , , и . ICEIS (4), стр. 308-316. (2003)A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks., , , и . GLOBECOM, стр. 778-783. IEEE, (2008)An agent based and biological inspired real-time intrusion detection and security model for computer network operations., , , , и . Comput. Commun., 30 (13): 2649-2660 (2007)Towards Scalability for Federated Identity Systems for Cloud-Based Environments., , и . NTMS, стр. 1-5. IEEE, (2014)A smart face-shield with active defogging against coronaVirus., , , , и . SmartNets, стр. 1-5. IEEE, (2022)TMN Distributed Management with CORBA: A Experience in Alarm Surveillance., , и . PDPTA, стр. 2692-2698. CSREA Press, (1999)Autonomic Intrusion Detection and Response Using Big Data., , , , и . IEEE Syst. J., 14 (2): 1984-1991 (2020)