Author of the publication

Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security.

, , , , , and . ICIOT, page 65-71. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Workflow Model., and . ACSW, volume 21 of CRPIT, page 33-41. Australian Computer Society, (2003)Developing e-Negotiation Process Support by Web Services., , and . ICWS, page 97-103. CSREA Press, (2003)The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services., , and . Int. J. Inf. Sec., 6 (5): 285-286 (2007)Developing e-Negotiation support with a meta-modeling approach in a Web services environment., , , , and . Decis. Support Syst., 40 (1): 51-69 (2005)A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems., , and . Expert Syst. Appl., (2023)ARVMEC: Adaptive Recommendation of Virtual Machines for IoT in Edge-Cloud Environment., , , , , and . J. Parallel Distributed Comput., (2020)A data-driven approach of performance evaluation for cache server groups in content delivery network., , , , , and . J. Parallel Distributed Comput., (2018)Privacy Policies and Preferences., , and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)MISSED - Studying Students' Development of Misconceptions in Hybrid Courses., , and . ICHL, volume 8038 of Lecture Notes in Computer Science, page 364-376. Springer, (2013)Can an Evidence-Based Blended Learning Model Serve Healthcare Patients and Adult Education Students?, , and . ICBL, volume 10949 of Lecture Notes in Computer Science, page 17-42. Springer, (2018)