Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disrupting Resilient Criminal Networks through Data Analysis: The case of Sicilian Mafia., , , , , , and . CoRR, (2020)A discussion of socio-economic management and incentives for the future internet, , , , , and . 2009 IEEE Globecom Workshops, page 1--6. IEEE, (2009)Edge-Enhanced QoS Aware Compression Learning for Sustainable Data Stream Analytics., , , , , and . IEEE Trans. Sustain. Comput., 8 (3): 448-464 (July 2023)Exploiting agent mobility for large-scale network monitoring., , and . IEEE Netw., 16 (3): 7-15 (2002)Effective Group Formation in Agent Societies., , , and . WOA, volume 2215 of CEUR Workshop Proceedings, page 39-44. CEUR-WS.org, (2018)A WNN-Based Approach for Network Intrusion Detection., , and . IDC, volume 1026 of Studies in Computational Intelligence, page 79-88. Springer, (2021)Online Extreme Learning on Fixed-Point Sensor Networks., , , and . ICDM Workshops, page 319-326. IEEE Computer Society, (2013)Social Network Analysis of Sicilian Mafia Interconnections., , , , , , and . COMPLEX NETWORKS (2), volume 882 of Studies in Computational Intelligence, page 440-450. Springer, (2019)Evaluating machine learning algorithms for applications with humans in the loop., , , and . ICNSC, page 459-464. IEEE, (2017)Embedded self-healing layer for detecting and recovering sensor faults in body sensor networks., , and . SMC, page 2377-2382. IEEE, (2012)