The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

João Bosco M. Sobral: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joubert de Castro Lima, Tiago Garcia de Senna Carneiro, Rodrigo Martins Pagliares, Júlio César Ferreira, João Bosco M. Sobral, Edgar Toshiro Yano
    Archcollect: A Set of Components Towards Web Users' Interactions. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2003, pp:308-316 [Conf]
  2. Joao Paulo Delgado Preti, Fernando M. B. M. de Castilho, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare, Azzedine Boukerche
    On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:525-528 [Conf]
  3. Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral
    Intrusion Detection Based on the Immune Human System. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  4. Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:146- [Conf]
  5. Renato B. Machado, Azzedine Boukerche, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare
    A Hybrid Artificial Immune and Mobile Agent Intrusion Detection Based Model for Computer Network Operations. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  6. Vera Lúcia Lorenet, João Bosco M. Sobral, Carlos Becker Westphall
    TMN Distributed Management with CORBA: A Experience in Alarm Surveillance. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2692-2698 [Conf]
  7. Azzedine Boukerche, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    An artificial immune based intrusion detection model for computer and telecommunication systems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2004, v:30, n:5-6, pp:629-646 [Journal]
  8. Azzedine Boukerche, Renato B. Machado, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
    An agent based and biological inspired real-time intrusion detection and security model for computer network operations. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2649-2660 [Journal]

  9. A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks. [Citation Graph (, )][DBLP]


  10. On modeling for pervasive computing environments. [Citation Graph (, )][DBLP]


  11. A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  12. Intrusion detection through artificial neural networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002