Author of the publication

Extension and use of KMRCRelat algorithm for biological problems.

, , and . J. Comput. Methods Sci. Eng., 6 (5-6): 157-170 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology Driven Security for Mobile Applications., and . Security and Management, page 434-440. CSREA Press, (2009)Qualitative and Quantitative Criteria for the Concept Evaluation Task., , and . World Congress on Engineering, page 331-336. Newswood Limited, (2007)A Mobile Agents and Artificial Neural Networks for Intrusion Detection., , and . J. Softw., 7 (1): 156-160 (2012)Distributed Agent Architecture for Intrusion Detection Based on New Metrics., , and . NSS, page 321-327. IEEE Computer Society, (2009)A bidirectional Bluetooth authentication scheme based on game-theoretic framwork., , and . ICWN, page 63-70. CSREA Press, (2006)An Agile Approach for Mobile applications Security., and . Security and Management, page 174-180. CSREA Press, (2010)Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques., , and . ISCC, page 643-648. IEEE Computer Society, (2008)Security Ontology Proposal for Mobile Applications., and . Mobile Data Management, page 580-587. IEEE Computer Society, (2009)Agent IDS based on Misuse Approach., , and . J. Softw., 4 (6): 495-507 (2009)Formal Method for Automated Transformation of Lotos Specifications to Estelle Specifications., and . Int. J. Softw. Eng. Knowl. Eng., 15 (5): 873-892 (2005)