Author of the publication

Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.

, , , , and . ISNN (1), volume 5551 of Lecture Notes in Computer Science, page 60-67. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Xiaoyaosan on Changes of Behavior in Chronic Immobilization Stress Rats., , , , , , , and . BMEI, page 1-4. IEEE, (2009)Multi-criteria fuzzy decision-making method based on cross entropy and score functions., and . Expert Syst. Appl., 38 (1): 1032-1038 (2011)A Hybrid Genetic Algorithm With Bidirectional Mutation for Maximizing Lifetime of Heterogeneous Wireless Sensor Networks., , and . IEEE Access, (2020)A novel genetic algorithm based on partitioning for large-scale network design problems., , , and . GECCO (Companion), page 111-112. ACM, (2014)Link mapping-oriented ant colony system for virtual network embedding., , , , , , and . CEC, page 1223-1230. IEEE, (2017)A novel genetic algorithm for constructing uniform test forms of cognitive diagnostic models., , , , , and . CEC, page 5195-5200. IEEE, (2016)A generalized method for dynamic noise inference in modeling sequential decision-making., , , and . CogSci, cognitivesciencesociety.org, (2023)A Multi-Label Learning Method Using Affinity Propagation and Support Vector Machine., , , and . IEEE Access, (2017)An Improved MOEA/D Based on Reference Distance for Software Project Portfolio Optimization., , , , , , and . Complex., (2018)A splicing-driven memetic algorithm for reconstructing cross-cut shredded text documents., , , , and . Appl. Soft Comput., (2016)