Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Attack Detection Using Fuzzy Logic and Data Mining., and . Security and Management, page 26-31. CSREA Press, (2006)Distributed Intrusion Detection trust management through integrity and expertise evaluation., , and . CyberSec, page 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , and . CyberSec, page 139-143. IEEE, (2012)A New Decentralized Certification Verification Privacy Control Protocol., , and . CRC, page 1-6. IEEE, (2021)Implementing a Document-based Requirements Traceability: A Case Study., , , and . IASTED Conf. on Software Engineering, page 124-131. IASTED/ACTA Press, (2005)CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism., , and . Int. J. Commun. Networks Inf. Secur., (2017)Integrating Software Traceability for Change Impact Analysis., , , and . Int. Arab J. Inf. Technol., 2 (4): 301-308 (2005)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , and . APSEC, page 558-. IEEE Computer Society, (2002)Integration of Secrecy Features in a Federated Database Environment., , and . DBSec, volume A-47 of IFIP Transactions, page 89-108. North-Holland, (1993)A Unified Trust Model for Pervasive Environments - Simulation and Analysis., , and . KSII Trans. Internet Inf. Syst., 7 (7): 1569-1584 (2013)