Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A backpropagation algorithm for multilayer hybrid order statistic filters.. ICASSP, page 1179-1182. IEEE, (1989)Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources., , , , and . Math. Comput. Model., 58 (5-6): 1389-1404 (2013)Special issue on advances in security and privacy in IoT., , and . J. Netw. Comput. Appl., (2019)Stackelberg games for modeling defense scenarios against cloud security threats., , and . J. Netw. Comput. Appl., (2018)Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems., and . Future Gener. Comput. Syst., (2020)Improving the gossiping effectiveness with distributed strategic learning (Invited paper)., , , and . Future Gener. Comput. Syst., (2017)Self-association in multilayer linear networks with limited connectivity., and . Neural Networks, 11 (4): 601-609 (1998)Analyses of the genetic algorithms in the continuous space., and . ICASSP, page 265-268. IEEE Computer Society, (1992)Analysis of wide-band cross-correlation for target detection and time delay estimation., , , and . ICASSP, page 1293-1296. IEEE Computer Society, (1991)Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms., , and . Concurr. Comput. Pract. Exp., (2018)