Author of the publication

Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II.

, , , and . IPDPS, page 146. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation-Based Performance Comparisons of Routing Protocols for Mobile Ad Hoc Networks.. Simulation, 78 (7): 401-407 (2002)Wireless Communication and Mobile Computing., , , , and . Handbook of Algorithms for Wireless Networking and Mobile Computing, Chapman and Hall/CRC, (2005)TCP-CC: cross-layer TCP pacing protocol by contention control on wireless networks., and . Wireless Networks, 21 (4): 1061-1078 (2015)Localized Routing Approach to Bypass Holes in Wireless Sensor Networks., , and . IEEE Trans. Computers, 63 (12): 3053-3065 (2014)Efficient and robust serial query processing approach for large-scale wireless sensor networks., , and . Ad Hoc Networks, (2016)Towards Efficient Vehicle Classification in Intelligent Transportation Systems., , and . DIVANet@MSWiM, page 19-25. ACM, (2015)A Voronoi Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks., , , and . ICCCN, page 497-502. IEEE, (2007)LIP: an efficient lightweight iterative positioning algorithm for wireless sensor networks., and . Wireless Networks, 22 (3): 825-838 (2016)Towards a novel trust-based opportunistic routing protocol for wireless networks., , , and . Wireless Networks, 22 (3): 927-943 (2016)Inter-vehicle communication of warning information: an experimental study., and . Wireless Networks, 23 (6): 1837-1848 (2017)