Author of the publication

Using Set-Based Heading to Improve Mobile Agent Movement.

, , , , and . SASO, page 120-128. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-inspired cyber security for the smart grid.. ISGT, page 1. IEEE, (2012)A Configurable Middleware Framework with Multiple Quality of Service Properties for Small Embedded Systems., , , , , , and . NCA, page 197-204. IEEE Computer Society, (2003)Using mobile agents and overlay networks to secure electrical networks., , , and . CSIIRW, page 32. ACM, (2013)Defense on the Move: Ant-Based Cyber Defense., , , and . IEEE Secur. Priv., 12 (2): 36-43 (2014)Segmentation of medical imagery with pulse-coupled neural networks., and . IJCNN, page 2659-2663. IEEE, (1999)Bio-Inspired Enterprise Security., , , , , and . SASO, page 212-213. IEEE Computer Society, (2011)Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , and . ICDCS Workshops, page 144-151. IEEE Computer Society, (2005)A configurable cryptography subsystem in a middleware framework for embedded systems., , and . Comput. Networks, 46 (6): 771-795 (2004)Bio-inspired cyber security for smart grid deployments., , , , and . ISGT, page 1-6. IEEE, (2013)Ant-Based Cyber Security., , , , , and . ITNG, page 918-926. IEEE Computer Society, (2011)