Author of the publication

A Comprehensive Approach to Designing Internet Security Taxonomy.

, , and . CCECE, page 1316-1319. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new image encryption algorithm based on a chaotic DNA substitution method., and . ICC, page 1011-1015. IEEE, (2012)A Sybil Resistant IoT Trust Model Using Blockchains., and . iThings/GreenCom/CPSCom/SmartData, page 1017-1026. IEEE, (2018)DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems., and . WCNC, page 1497-1502. IEEE, (2009)Cross-Scenario Performance Modelling for Big Data Ecosystems., and . HCI (37), volume 12217 of Lecture Notes in Computer Science, page 211-228. Springer, (2020)Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions., , , and . Clust. Comput., 19 (3): 1227-1242 (2016)Adaptive ROC-based ensembles of HMMs applied to anomaly detection., , , and . Pattern Recognit., 45 (1): 208-230 (2012)Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs., , , and . Pattern Recognit., 43 (8): 2732-2752 (2010)Unitary Space-Time Group Codes: Diversity Sums From Character Tables., , and . IEEE Trans. Inf. Theory, 54 (11): 5203-5210 (2008)Unitary Space-Time Constellation Designs From Group Codes., , and . IEEE Trans. Inf. Theory, 53 (11): 4322-4329 (2007)An Application of theBruhat Decomposition to the Design of Full Diversity Unitary Space-Time Codes., , and . IEEE Trans. Inf. Theory, 55 (1): 232-244 (2009)