Author of the publication

Modeling access control for cyber-physical systems using reputation.

, , , , and . Comput. Electr. Eng., 38 (5): 1088-1101 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cloud Resource Allocation Mechanism Based on Mean-Variance Optimization and Double Multi-Attribution Auction., , and . NPC, volume 8147 of Lecture Notes in Computer Science, page 106-117. Springer, (2013)A location aided controlled spraying routing algorithm for Delay Tolerant Networks., , , and . Ad Hoc Networks, (2017)ACO-inspired ICN Routing mechanism with Mobility support., , and . Appl. Soft Comput., (2017)An intelligent fault-tolerant QoS unicast routing mechanism based on the outlook algorithm., , and . FSKD, page 229-234. IEEE, (2013)A resource allocation method based on the limited English combinatorial auction under cloud computing environment., , and . FSKD, page 905-909. IEEE, (2012)Risk Evaluation for Virtual Enterprise., , , , and . ICEB, page 702-707. Academic Publishers/World Publishing Corporation, (2004)Risk Sorting for Enterprise under EC Environments., , , and . ICEB, page 708-712. Academic Publishers/World Publishing Corporation, (2004)A novel routing algorithm over the multipath networks., , , and . BMEI, page 729-733. IEEE, (2013)An Evolutionary Multi-agent Preventive Fault-Tolerant QoS Unicast Routing Mechanism., , and . HPCC/EUC, page 1254-1261. IEEE, (2013)Constructing Delay-bounded Multicast Tree with Optimal Delay Variation., , and . ICC, page 800-805. IEEE, (2006)