Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Intrusion Detection trust management through integrity and expertise evaluation., , and . CyberSec, page 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , and . CyberSec, page 139-143. IEEE, (2012)Novel Attack Detection Using Fuzzy Logic and Data Mining., and . Security and Management, page 26-31. CSREA Press, (2006)A New Decentralized Certification Verification Privacy Control Protocol., , and . CRC, page 1-6. IEEE, (2021)Implementing a Document-based Requirements Traceability: A Case Study., , , and . IASTED Conf. on Software Engineering, page 124-131. IASTED/ACTA Press, (2005)Integrating Software Traceability for Change Impact Analysis., , , and . Int. Arab J. Inf. Technol., 2 (4): 301-308 (2005)CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism., , and . Int. J. Commun. Networks Inf. Secur., (2017)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , and . APSEC, page 558-. IEEE Computer Society, (2002)A Unified Trust Model for Pervasive Environments - Simulation and Analysis., , and . KSII Trans. Internet Inf. Syst., 7 (7): 1569-1584 (2013)Integration of Secrecy Features in a Federated Database Environment., , and . DBSec, volume A-47 of IFIP Transactions, page 89-108. North-Holland, (1993)