Author of the publication

Monitoring for Slow Suspicious Activities Using a Target Centric Approach.

, , , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 163-168. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A telematic system for oncology based on electronic health and patient records., , and . IEEE Trans. Information Technology in Biomedicine, 5 (1): 16-17 (2001)Exception representation and management in open multi-agent systems., , , and . Inf. Sci., 179 (15): 2555-2561 (2009)CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey., , , , , , , and . Future Gener. Comput. Syst., (2019)Platform as a service gateway for the Fog of Things., , , , , and . Adv. Eng. Informatics, (2017)Integration, optimization and usability of enterprise applications., , , and . J. Netw. Comput. Appl., 36 (6): 1480-1488 (2013)CSCW Design Team Selection and Issue Management., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)Integrated image enhancement method for biometric security., , and . SMC, page 1716-1721. IEEE, (2011)An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images., , , , , and . Neurocomputing, (2016)A New Architecture for Network Intrusion Detection and Prevention., , and . IEEE Access, (2019)Project management system review and redesign using user-centred design methodology., , , and . CSCWD, page 139-145. IEEE, (2011)