Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving technological isolation to build virtual learning communities., , , and . Multimedia Tools Appl., 74 (19): 8521-8539 (2015)Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections., , , , and . Computing, 96 (9): 829-841 (2014)Building Scalable Software for Data Centers: An Approach to Distributed Computing at Enterprise Level., , and . Handbook on Data Centers, Springer, (2015)Monitoring of Data Centers using Wireless Sensor Networks., , and . Handbook on Data Centers, Springer, (2015)Dynamic IEEE 802.21 information server mesh architecture for heterogeneous networks., , , , , and . IJAHUC, 21 (3): 207-219 (2016)Online masquerade detection resistant to mimicry., , and . Expert Syst. Appl., (2016)Advanced Technologies and Communication Solutions for Internet of Things., , and . IJDSN, (2014)Hybrid ACO Routing Protocol for Mobile Ad Hoc Networks., , , and . IJDSN, (2013)A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network., , , and . WOSIS, page 84-93. INSTICC Press, (2005)Entropy-Based Economic Denial of Sustainability Detection., , and . Entropy, 19 (12): 649 (2017)