Author of the publication

Safe Runtime Reconfiguration in Component-Based Software Systems.

, and . Software Engineering Research and Practice, page 122-126. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for monitoring pedestrian by using multi-connect architected MCA associative memory., and . JDCTA, 3 (2): 75-82 (2009)State-of-the-art in artificial neural network applications: A survey, , , , , and . Heliyon, 4 (11): e00938 (2018)A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm., and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 777-792. Springer, (2011)A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions., , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 213-229. Springer, (2021)An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction., and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 149 of Studies in Computational Intelligence, Springer, (2008)Privacy Risk Diagnosis: Mining l-Diversity., , and . DASFAA Workshops, volume 5667 of Lecture Notes in Computer Science, page 216-230. Springer, (2009)A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems., , , , , and . IEEE Access, (2019)An Agent-based Design Pattern for Decoupling Views of E-business System., and . CITA, page 93-100. (2003)F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics., and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 693-701. Springer, (2011)A Secure Storage Model to Preserve Evidence in Network Forensics., and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 391-402. Springer, (2011)