Author of the publication

Wireless Sensor Networks and Software Agents.

, and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach of e-learning-adaptive based on ant colonies optimisation algorithm., , and . ICMCS, page 827-832. IEEE, (2012)Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system - initial considerations., , , , and . Scalable Comput. Pract. Exp., (2013)A new mechanism to ensure integrity for MapReduce in cloud computing., , , and . ICMCS, page 785-790. IEEE, (2012)Wireless Sensor Networks and Software Agents., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods., , , and . MoMM, page 256-259. ACM, (2011)Introduction., , and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Collaborative learning and wiki., and . ICMCS, page 870-875. IEEE, (2012)Securing the Internet of Things (IoT)., , , and . WINCOM, page 1-6. IEEE, (2018)