Author of the publication

Remodeling and Simulation of Intrusion Detection Evaluation Dataset.

, , and . Security and Management, page 245-251. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remodeling and Simulation of Intrusion Detection Evaluation Dataset., , and . Security and Management, page 245-251. CSREA Press, (2006)A Transaction Model for Service Grid Environment and Implementation Considerations., , and . ICWS, page 949-950. IEEE Computer Society, (2006)Knowledge-Empowered Automated Negotiation System for B2B e-Commerce., , , and . CEC/EEE, page 192-202. IEEE Computer Society, (2007)HCM - A Model Describing Cooperation of Virtual Enterprise., and . EDCIS, volume 2480 of Lecture Notes in Computer Science, page 257-266. Springer, (2002)A General Merging Algorithm Based on Object Marking., and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 636-643. Springer, (2003)Pattern-Oriented Planning Approach for Grid Workflow Generation., , , and . GCC Workshops, page 275-281. IEEE Computer Society, (2006)Knowledge-empowered automated negotiation system for e-Commerce., , and . Knowl. Inf. Syst., 17 (2): 167-191 (2008)A novel channel assignment algorithm based on topology simplification in multi-radio wirelesss mesh networks., , and . IPCCC, IEEE, (2006)CovaFlow: a General Workflow System by Cova., , and . CSCWD, page 414-419. IEEE, (2001)The Specification of Workflow Activity Multiple Instances., , and . CSCWD, page 1179-1183. IEEE, (2006)