Author of the publication

Measuring of Strategies' Similarity in Automated Negotiation.

, , and . IMECS, page 859-863. Newswood Limited, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language., , and . ECOWS, page 203-212. IEEE Computer Society, (2007)SANT: Static Analysis of Native Threads for Security Vetting of Android Applications., and . ISC Int. J. Inf. Secur., 14 (1): 13-25 (2022)Interdependency Analysis in Security Investment against Strategic Attacks., and . Inf. Syst. Frontiers, 22 (1): 187-201 (2020)Measuring of Strategies' Similarity in Automated Negotiation., , and . IMECS, page 859-863. Newswood Limited, (2007)An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks., , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 129-143. Springer, (2011)A conceptual framework for specification, analysis, and design of anonymity services., and . EDBT/ICDT Workshops, volume 360 of ACM International Conference Proceeding Series, page 131-138. ACM, (2009)Privacy, reputation, and incentive provision for vehicular social networks., , and . J. Reliab. Intell. Environ., 9 (4): 447-461 (December 2023)A machine learning approach for detecting and categorizing evasion sources in Android malware., , , and . ISCISC, page 28-34. IEEE, (2021)Comparing Negotiation Strategies Based on Offers., , and . DMBiz@PAKDD, volume 177 of Frontiers in Artificial Intelligence and Applications, page 87-98. IOS Press, (2007)Quantitative verification of beta reputation system using PRISM probabilistic model checker., and . ISCISC, page 1-6. IEEE, (2013)