Author of the publication

Distributed Multi-agent System Architecture for Mobile Traders.

, , and . ICIT, page 214-216. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid intelligent systems for detecting network intrusions., , and . Secur. Commun. Networks, 8 (16): 2741-2749 (2015)A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System, and . International Journal on Network Security, 1 (2): 6 (July 2010)An event based, non-intrusive monitoring framework for Web Service Based Systems., and . CISIM, page 547-552. IEEE, (2010)Web-services classification using intelligent techniques., , and . Expert Syst. Appl., 37 (7): 5484-5490 (2010)LBS based framework to obstruct linking attack in data releases., and . Multimedia Tools Appl., 78 (23): 33805-33835 (2019)Application of Machine Learning Techniques to Predict Software Reliability., , and . Int. J. Appl. Evol. Comput., 1 (3): 70-86 (2010)A Software Agent Based Approach for Fraud Detection in Network Crimes., and . AACC, volume 3285 of Lecture Notes in Computer Science, page 310-316. Springer, (2004)Semi-Naïve Bayesian Method for Network Intrusion Detection System., and . ICONIP (1), volume 5863 of Lecture Notes in Computer Science, page 614-621. Springer, (2009)Anonymization of attributed social graph using anatomy based clustering., and . Multimedia Tools Appl., 78 (18): 25455-25486 (2019)Quality Assurance Model for "Bhulekh": An e-Governance Application., , and . ICIT, page 193-199. IEEE, (2015)