Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Reduce False Alarms in an Intrusion Detection System., , and . Security and Management, page 127-132. CSREA Press, (2005)Paving the Road Towards Business to Software Unified Modeling Using Extended UML., , and . Software Engineering Research and Practice, page 165-170. CSREA Press, (2004)Retraction notice to "Investigating the efficiency in oil futures market based on GMDH approach" Expert Systems with Applications 36 (2009) 7479-7483., , , and . Expert Syst. Appl., 42 (12): 5401 (2015)Normalized Similarity Index: An adjusted index to prioritize article citations., , , and . J. Informetrics, 7 (1): 91-98 (2013)A Corrective Integrated Transmission and Distribution Co-Simulation for Scenario Analysis of Different Technology Penetration., , , and . ISGT-Europe, page 680-684. IEEE, (2020)Cyber-Physical Blockchain Based Secure Platforms for Data and Energy Trading in Multi-Level Electricity Markets., , and . CCECE, page 248-255. IEEE, (2022)A New Approach Towards Mature Software Models Through Business to Software Unified Process (BSUP)., , and . IKE, page 370-378. CSREA Press, (2003)Recognizing Tenacious Graphs Is NP-Hard., , and . Ars Comb., (2014)Residual design of sink localization algorithms for wireless sensor networks., , , and . J. High Speed Networks, 25 (1): 87-99 (2019)Real-world gender classification via local Gabor binary pattern and three-dimensional face reconstruction by generic elastic model., , and . IET Image Processing, 9 (8): 690-698 (2015)