From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Novel Attack Detection Using Fuzzy Logic and Data Mining., и . Security and Management, стр. 26-31. CSREA Press, (2006)Distributed Intrusion Detection trust management through integrity and expertise evaluation., , и . CyberSec, стр. 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , и . CyberSec, стр. 139-143. IEEE, (2012)A New Decentralized Certification Verification Privacy Control Protocol., , и . CRC, стр. 1-6. IEEE, (2021)Implementing a Document-based Requirements Traceability: A Case Study., , , и . IASTED Conf. on Software Engineering, стр. 124-131. IASTED/ACTA Press, (2005)Integrating Software Traceability for Change Impact Analysis., , , и . Int. Arab J. Inf. Technol., 2 (4): 301-308 (2005)CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism., , и . Int. J. Commun. Networks Inf. Secur., (2017)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , и . APSEC, стр. 558-. IEEE Computer Society, (2002)A Unified Trust Model for Pervasive Environments - Simulation and Analysis., , и . KSII Trans. Internet Inf. Syst., 7 (7): 1569-1584 (2013)Re-documenting, Visualizing and Understanding Software System Using DocLike Viewer., , , и . APSEC, стр. 154-163. IEEE Computer Society, (2003)