Author of the publication

Social network analysis of the vulnerabilities of interdependent critical infrastructures.

, , , , , , , and . IJCIS, 4 (3): 256-273 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Conceptual Model for Fuzzy Data Modeling., , and . WISE (2), page 75-80. IEEE Computer Society, (2000)0-7695-0577-5.DEPSO: hybrid particle swarm with differential evolution operator., and . SMC, page 3816-3821. IEEE, (2003)Combining eye movement and hand movement measures for evaluating human-machine interfaces., and . SMC, page 1089-1096. IEEE, (2003)Determination of the Minimum Sample Size in Microarray Experiments to Cluster Genes Using K-means Clustering., , and . BIBE, page 401-406. IEEE Computer Society, (2003)An Integrated Road Construction and Resource Planning Approach to the Evacuation of Victims From Single Source to Multiple Destinations., , and . IEEE Trans. Intelligent Transportation Systems, 11 (2): 277-289 (2010)Pd-Type on-Line Learning Control for Systems with State uncertainties and Measurement disturbances., , and . Control and Intelligent Systems, (2007)Extending IDEF1X to model fuzzy data., , and . J. Intelligent Manufacturing, 13 (4): 295-307 (2002)Influence of transient flow and solder bump resistance on underfill process., , and . Microelectronics Journal, 36 (8): 687-693 (2005)Fuzzy data compression based on data dependencies., , and . Int. J. Intell. Syst., 17 (4): 409-426 (2002)Optimizing semiconductor devices by self-organizing particle swarm., , and . IEEE Congress on Evolutionary Computation, page 2017-2022. IEEE, (2004)