Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication and Autoconfiguration for MANET Nodes., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 41-52. Springer, (2004)Performance Evaluation of Software Defined Network Controllers., , , , , and . CLOSER, page 363-370. SCITEPRESS, (2020)Ontologic audit trails mapping for detection of irregularities in payrolls., , , , , , , and . CASoN, page 339-344. IEEE, (2012)Antenna array based framework with multipath mitigation for signal emitter detection and localization., , , , and . ICSPCS, page 1-5. IEEE, (2017)Load Balancing and Survivability for Network Services Based on Intelligent Agents., , , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 868-881. Springer, (2004)Design and Evaluation of a Data Collector and Analyzer to Monitor the COVID-19 and Other Epidemic Outbreaks., , , , , and . ICITS (1), volume 1330 of Advances in Intelligent Systems and Computing, page 23-35. Springer, (2021)Extended ADDIE Model for improved Distance Learning Courses., , , , , , , and . FIE, page 1-5. IEEE, (2018)InfoSecRM: Uma Abordagem Ontológica para a Gestão de Riscos de Segurança da Informação., , , and . SBSI, page 37-48. (2012)Autonomic trust reasoning enables misbehavior detection in OLSR., , , and . SAC, page 2006-2013. ACM, (2008)Increasing the Dependability of IoT Middleware with Cloud Computing and Microservices., , , , and . UCC (Companion"), page 203-208. ACM, (2017)