Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An artificial immune based intrusion detection model for computer and telecommunication systems., , , and . Parallel Comput., 30 (5-6): 629-646 (2004)A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks., , , and . LCN, page 697-704. IEEE Computer Society, (2008)On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-Commerce., , , , , and . ICPADS (2), page 525-528. IEEE Computer Society, (2005)Archcollect: A Set of Components Towards Web Users' Interactions., , , , , and . ICEIS (4), page 308-316. (2003)A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks., , , and . GLOBECOM, page 778-783. IEEE, (2008)An agent based and biological inspired real-time intrusion detection and security model for computer network operations., , , , and . Comput. Commun., 30 (13): 2649-2660 (2007)A smart face-shield with active defogging against coronaVirus., , , , and . SmartNets, page 1-5. IEEE, (2022)Towards Scalability for Federated Identity Systems for Cloud-Based Environments., , and . NTMS, page 1-5. IEEE, (2014)Autonomic Intrusion Detection and Response Using Big Data., , , , and . IEEE Syst. J., 14 (2): 1984-1991 (2020)Intrusion Detection Based on the Immune Human System., , and . IPDPS, IEEE Computer Society, (2002)