Author of the publication

Towards quality of experience-based reputation models for future web service provisioning

, , , , , and . Telecommunication Systems, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense., , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 156-174. Springer, (2019)Steganography of VoIP Streams., and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1001-1018. Springer, (2008)Lost audio packets steganography: the first practical evaluation.. Secur. Commun. Networks, 5 (12): 1394-1403 (2012)Design and performance evaluation of reversible network covert channels., , , and . ARES, page 68:1-68:8. ACM, (2020)Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , and . Special Issue of the Springer Telecommunication Systems Journal: Future Internet Services and Architectures - Trends and Visions, print available in 2013, (2010)Mobile Communications and Networks., , , and . IEEE Communications Magazine, 57 (12): 37 (2019)Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , and . Future Internet Architectures: New Trends in Service Architectures (2nd Euro-NF Workshop), Santander, Spain, (June 2009)Steganographic Routing in Multi Agent System Environment, , and . CoRR, (2008)Hiding Information in Retransmissions, , and . CoRR, (2009)DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning., , , and . ARES, page 66:1-66:9. ACM, (2021)