Author of the publication

A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks.

, , , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Success Factors Analysis of Integration of O2O into 7-Eleven Convenient Store., , , and . HCI (23), volume 11588 of Lecture Notes in Computer Science, page 38-50. Springer, (2019)How to manage information security in cloud computing., , and . SMC, page 1405-1410. IEEE, (2011)Fuzzy markup language for university assessment., , , , , , , and . SMC, page 954-959. IEEE, (2011)The concepts of big data applied in personal knowledge management., , and . J. Knowl. Manag., 21 (1): 213-230 (2017)Evaluating and selecting the biometrics in network security., , , and . Secur. Commun. Networks, 8 (5): 727-739 (2015)Applying Fuzzy AHP to study the KSFs of information security management., , , and . FUZZ-IEEE, page 2026-2032. IEEE, (2011)FML-based decision support system for solar energy supply and demand analysis., , , , and . FUZZ-IEEE, IEEE, (2013)The Proposal of Conditions of Personal Engagement in Knowledge Harvesting., , and . ICEBE, page 747-750. IEEE Computer Society, (2007)Apply fuzzy ontology and FML to knowledge extraction for university governance and management., , , , , and . J. Ambient Intell. Humaniz. Comput., 4 (4): 493-513 (2013)FML-based knowledge management system for university governance and management assessment., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2012)