Author of the publication

Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.

, , , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 357-360. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Screening Smartphone Applications Using Behavioral Signatures., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 14-27. Springer, (2013)Improving VoIP Call Capacity of Multi-Hop Wireless Networks through Self-Controlled Frame Aggregation., , , and . VTC Fall, page 1-5. IEEE, (2006)Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations., , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 584-593. Springer, (2007)Reducing Payload Scans for Attack Signature Matching Using Rule Classification., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 350-360. Springer, (2008)A connection management protocol for stateful inspection firewalls in multi-homed networks., , and . ICC, page 1887-1891. IEEE, (2004)A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs., , , , and . GLOBECOM, IEEE, (2006)UDP-Based Active Scan for IoT Security (UAIS)., , and . KSII Trans. Internet Inf. Syst., 15 (1): 20-34 (2021)Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly., and . KSII Trans. Internet Inf. Syst., 4 (4): 671-690 (2010)OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept., , , and . DSN, page 174-185. IEEE, (2021)Bayesian memory-based reputation system., , , , and . MobiMedia, volume 329 of ACM International Conference Proceeding Series, page 9. ICST, (2007)