Author of the publication

Cognitive security management with reputation based cooperation schemes in heterogeneous networks.

, , , , , , and . CICS, page 19-23. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Chamois Reconfigurable Data-Mining Architecture., , , , , , , , , and 5 other author(s). J. Object Technol., 1 (2): 21-33 (2002)On using category experts for improving the performance and accuracy in recommender systems., , , and . CIKM, page 2355-2358. ACM, (2012)Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication., , , , , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 370-381. Springer, (2005)Intelligent power management device with middleware based living pattern learning for power reduction., , , , and . IEEE Trans. Consumer Electronics, 55 (4): 2081-2089 (2009)Distributed processing of event data and multi-faceted knowledge in a collaboration federation., , , , , , and . ISI, page 64-69. IEEE, (2008)Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants., , and . Secur. Commun. Networks, (2022)A Knowledge Network Approach for Implementing Active Virtual Marketplaces., , and . J. Data Semant., (2005)Speeding up Warehouse Physical Design Using a Randomized Algorithm., and . DMDW, volume 19 of CEUR Workshop Proceedings, page 3. CEUR-WS.org, (1999)Software Architecture Module-View Recovery Using Cluster Ensembles., , , and . IEEE Access, (2019)Efficient recommendation methods using category experts for a large dataset., , , , and . Inf. Fusion, (2016)