Author of the publication

A Multi-agent Based Information Infrastructure for Manufacturing.

, and . DIISM, volume 191 of IFIP Conference Proceedings, page 388-395. Kluwer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accessibility analysis of web browsers., and . Int. J. Serv. Technol. Manag., 23 (4): 313-330 (2017)k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization., and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 299-310. Springer, (2015)Discriminative multinomial Naïve Bayes for network intrusion detection., , and . IAS, page 5-10. IEEE, (2010)Unsupervised Sequential Information Bottleneck Clustering For Building Anomaly Based Network Intrusion Detection Model., and . IICAI, page 1659-1669. IICAI, (2009)LBS based framework to obstruct linking attack in data releases., and . Multimedia Tools Appl., 78 (23): 33805-33835 (2019)Quality Assurance Model for "Bhulekh": An e-Governance Application., , and . ICIT, page 193-199. IEEE, (2015)An event based, non-intrusive monitoring framework for Web Service Based Systems., and . CISIM, page 547-552. IEEE, (2010)Quality assurance model for e-governance projects: a case study on e-counseling., , and . ICEGOV, page 502-503. ACM, (2012)A Software Agent Based Approach for Fraud Detection in Network Crimes., and . AACC, volume 3285 of Lecture Notes in Computer Science, page 310-316. Springer, (2004)A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System, and . International Journal on Network Security, 1 (2): 6 (July 2010)