Author of the publication

A comprehensive RFID solution to enhance inpatient medication safety.

, , , and . Int. J. Medical Informatics, 80 (1): 13-24 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control for the Cloud Based on Multi-device Authentication., , and . TrustCom/BigDataSE/ISPA (1), page 856-863. IEEE, (2015)Autonomous decision on intrusion detection with trained BDI agents., , and . Comput. Commun., 31 (9): 1803-1813 (2008)Adaptive Agents Applied to Intrusion Detection., , and . CEEMAS, volume 2691 of Lecture Notes in Computer Science, page 445-453. Springer, (2003)Flaws on RFID grouping-proofs. Guidelines for future sound protocols., , , and . J. Netw. Comput. Appl., 34 (3): 833-845 (2011)Analysis of update delays in signature-based network intrusion detection systems., , and . Comput. Secur., 30 (8): 613-624 (2011)Robust New Method in Frequency Domain Watermarking., , , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 166-182. Springer, (2001)DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks., , , and . Comput. Networks, (2015)Fuzzy logic on decision model for IDS., , and . FUZZ-IEEE, page 1237-1242. IEEE, (2003)A multi-agent scanner to detect stored-XSS vulnerabilities., , , and . ICITST, page 1-6. IEEE, (2010)Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques., , , and . HICSS, IEEE Computer Society, (2006)