Author of the publication

Multi-Agent Heterogeneous Intrusion Detection System.

, and . CS&P, volume 1269 of CEUR Workshop Proceedings, page 184-195. CEUR-WS.org, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process Communication Environment., and . NAPAW, page 27-40. Springer, (1992)Dynamics Security Policies and Process Opacity for Timed Process Algebras.. Ershov Memorial Conference, volume 9609 of Lecture Notes in Computer Science, page 149-157. Springer, (2015)Real-Time Communication Networks.. NATO ASI RTC, volume 127 of NATO ASI Series, page 691. Springer, (1992)Information Flow Testing.. Fundam. Informaticae, 128 (1-2): 81-95 (2013)Quantification of Positive and Negative Attacker's Information.. Fundam. Informaticae, 120 (3-4): 311-324 (2012)Genomorphisms of Semi-Modular Lattices.. J. Comput. Syst. Sci., 40 (2): 182-187 (1990)Test Based Security.. CS&P, volume 928 of CEUR Workshop Proceedings, page 135-146. CEUR-WS.org, (2012)Process Environment Opacity.. CS&P, volume 1698 of CEUR Workshop Proceedings, page 209-220. CEUR-WS.org, (2016)Modeling and Evaluation of a Power-Aware Algorithm for IoT Bluetooth Low Energy Devices., , , , , and . SmartIoT, page 28-35. IEEE, (2019)Security Testing for Multi-Agent Systems., and . IWANN (1), volume 11506 of Lecture Notes in Computer Science, page 703-715. Springer, (2019)