Author of the publication

A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies.

, , , and . IJATS, 5 (3): 54-74 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role-Based Autonomic Systems.. IJSSCI, 2 (3): 32-51 (2010)Challenges to Reusable Services.. IEEE SCC, page 243-244. IEEE Computer Society, (2005)Making agent roles perceivable through proxy bytecode manipulation., and . CTS, page 408-416. IEEE Computer Society, (2009)Establishing the foundation of adaptive collaboration., , and . CTS, page 546-554. IEEE, (2010)Building reusable components with service-oriented architectures.. IRI, page 96-101. IEEE Systems, Man, and Cybernetics Society, (2005)The Construction Approach of Regular Expressions from Finite Automata Including Multi-Node Loops., , and . IEEE ICCI, page 771-776. IEEE Computer Society, (2006)A visualized tool of role transfer., , , , and . SMC, page 2225-2230. IEEE, (2008)Collective group role assignment and its complexity.. SMC, page 351-356. IEEE, (2011)Agent Evaluation in Distributed Adaptive Systems., , and . SMC, page 752-757. IEEE, (2013)Minimal role playing logic in Role-Based Collaboration., , , and . SMC, page 1420-1425. IEEE, (2014)