Author of the publication

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.

, , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timetabling in Hong Kong secondary schools., , and . Comput. Educ., 28 (3): 173-183 (1997)Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis., and . J. Inf. Secur. Appl., (2019)A Business Continuity Management Simulator., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 9-18. Springer, (2010)Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection., and . Int. J. Comput. Intell. Syst., 6 (4): 626-638 (2013)Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones., , and . SAC, page 1680-1687. ACM, (2014)Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones., , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 331-350. Springer, (2012)IDS False Alarm Filtering Using KNN Classifier., and . WISA, volume 3325 of Lecture Notes in Computer Science, page 114-121. Springer, (2004)Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection., , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 115-124. Springer, (2012)A vision for the development of i-campus.. Smart Learn. Environ., 2 (1): 2 (2015)Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions., , and . IEEE Commun. Surv. Tutorials, 24 (1): 280-305 (2022)