Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SisBrAV - Brazilian Vulnerability Alert System., , , , , and . WOSIS, page 67-76. INSTICC Press, (2005)An Efficient Algorithm for Searching Optimal Shortened Cyclic Single-Burst-Correcting Codes., , , and . IEEE Communications Letters, 16 (1): 89-91 (2012)Intelligent system for time series classification using support vector machines applied to supply-chain., , and . Expert Syst. Appl., 39 (12): 10590-10599 (2012)Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract)., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 393-394. Springer, (2012)Improving the Wi-Fi Channel Scanning Using a Decentralized IEEE 802.21 Information Service., , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 290-294. Springer, (2011)Evolution and Challenges of Software Defined Networking., , and . SDN4FNS, page 1-7. IEEE, (2013)Grid of Learning Resources in E-learning Communities., , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 295-299. Springer, (2011)Analysis of MP4 Videos in 5G Using SDN., , and . IEEE Trans. Intell. Transp. Syst., 23 (3): 2668-2677 (2022)Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo., , , , and . IEEE Access, (2019)Agency Theory: Designing Optimal Incentives in the Insurance Sector., , , and . AISI, volume 152 of Lecture Notes on Data Engineering and Communications Technologies, page 150-159. Springer, (2022)