Author of the publication

Event-Based Method for Detecting Trojan Horses in Mobile Devices.

, , , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 153-162. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating adaptive learning paths using Ant Colony Optimization and Bayesian Networks., , , and . IJCNN, page 3834-3839. IEEE, (2008)Managing of Cluster Resources and Services through the Web., , , , and . ERCIM News, (2008)Máquinas l-SVCR con salidas probabilísticas., , , and . Inteligencia Artif., 6 (17): 72-82 (2002)Bullfighting extreme scenarios in efficient hyper-scale cluster computing., , , and . Clust. Comput., 23 (4): 3387-3403 (2020)Modeling Smart Homes for Prediction Algorithms., , , , , and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 26-33. Springer, (2007)Trip destination prediction based on past GPS log using a Hidden Markov Model., , , and . Expert Syst. Appl., 37 (12): 8166-8171 (2010)Defining Adaptive Learning Paths For Competence-Oriented Learning., , , and . e-Learning, page 403-410. IADIS, (2008)Measures of similarity between qualitative descriptions of shape, colour and size applied to mosaic assembling., , , and . J. Vis. Commun. Image Represent., 24 (3): 388-396 (2013)Continuación de los Equilibrios de un Sistema Dinámico Económico con Bifurcaciones de Codimensión 1 y 2., , , , and . Computación y Sistemas, (2002)Event-Based Method for Detecting Trojan Horses in Mobile Devices., , , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 153-162. Springer, (2010)