Author of the publication

Autonomic-computing approach to secure knowledge management: a game-theoretic analysis.

, , and . IEEE Trans. Syst. Man Cybern. Part A, 36 (3): 487-497 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decision Support to Improve Service Quality in Demand Surge Situations.. AMCIS, page 384. Association for Information Systems, (2007)Collaborative Self-Configuration and Learning in Autonomic Computing Systems: Applications to Supply Chain., , , and . ICAC, page 303-304. IEEE Computer Society, (2006)Optimizing Regional Aid during Public Health Emergencies: An Autonomic Resource Allocation Approach., , and . HICSS, page 136. IEEE Computer Society, (2007)Autonomic-computing approach to secure knowledge management: a game-theoretic analysis., , and . IEEE Trans. Syst. Man Cybern. Part A, 36 (3): 487-497 (2006)A Structured Graphical Tool for Analyzing Boundary Scan Violations., , , and . ITC, page 755-762. IEEE Computer Society, (2002)Enhancing Syndromic Surveillance through Autonomic Health Grids., , , and . AMCIS, page 291. Association for Information Systems, (2005)Individuality of Handwriting: A Validation Study., , , and . ICDAR, page 106-109. IEEE Computer Society, (2001)Looking at Information Security through a Prospect Theory Lens., , and . AMCIS, page 167. Association for Information Systems, (2006)A Comprehensive Approach to Assessing and Analyzing 1149.1 Test Logic., , , , and . ITC, page 358-367. IEEE Computer Society, (2003)