Author of the publication

Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters.

, , , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 543-552. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ROME4EU - A service-oriented process-aware information system for mobile devices., , and . Softw., Pract. Exper., 42 (10): 1275-1314 (2012)Time and Activity Sequence Prediction of Business Process Instances., , , and . CoRR, (2016)Scientific workflows for process mining: building blocks, scenarios, and implementation., , and . STTT, 18 (6): 607-628 (2016)Adaptive Process Management in Highly Dynamic and Pervasive Scenarios. YR-SOC, volume 2 of EPTCS, page 83-97. (2009)Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters., , , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 543-552. Springer, (2010)A Framework to Evaluate and Compare Decision-Mining Techniques., , and . Business Process Management Workshops, volume 342 of Lecture Notes in Business Information Processing, page 482-493. Springer, (2018)Visual Support for Work Assignment in Process-Aware Information Systems., , and . BPM, volume 5240 of Lecture Notes in Computer Science, page 67-83. Springer, (2008)Process Mining Manifesto., , , , , , , , , and 67 other author(s). Business Process Management Workshops (1), volume 99 of Lecture Notes in Business Information Processing, page 169-194. Springer, (2011)From Low-Level Events to Activities - A Pattern-Based Approach., , , , and . BPM, volume 9850 of Lecture Notes in Computer Science, page 125-141. Springer, (2016)Discovering Branching Conditions from Business Process Execution Logs., , and . FASE, volume 7793 of Lecture Notes in Computer Science, page 114-129. Springer, (2013)