Author of the publication

Enhancing host security using external environment sensors.

, , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient scheme for probabilistic skyline queries over distributed uncertain data., , and . Telecommunication Systems, 60 (2): 225-237 (2015)Multi-objective multicast routing optimization in Cognitive Radio Networks., and . WCNC, page 2576-2581. IEEE, (2014)Customer satisfaction and competitiveness in the Chinese E-retailing: Structural equation modeling (SEM) approach to identify the role of quality factors., , , , and . Expert Syst. Appl., 41 (1): 69-80 (2014)A New Study on Distance Metrics as Similarity Measurement., , , and . ICME, page 533-536. IEEE Computer Society, (2006)Two-Dimensional Adaptive Discriminant Analysis., , , and . ICASSP (1), page 985-988. IEEE, (2007)On propagation of self-similar traffic through an energy-conserving wireless gateway., and . ICASSP (4), page 285-288. IEEE, (2005)Toward Robust Distance Metric Analysis for Similarity Estimation., , , and . CVPR (1), page 316-322. IEEE Computer Society, (2006)Is high-speed wireless network traffic self-similar?, and . ICASSP (2), page 425-428. IEEE, (2004)POLUS: A POwerful Live Updating System., , , , and . ICSE, page 271-281. IEEE Computer Society, (2007)Exploiting Error Estimating Codes for Packet Length Adaptation in Low-Power Wireless Networks., , and . IEEE Trans. Mob. Comput., 14 (8): 1601-1614 (2015)