From post

Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.

, , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Collaborative Filtering Recommendation Algorithm Based on Attention GRU and Adversarial Learning., , и . IEEE Access, (2020)Impact of social reward on the evolution of cooperation in voluntary prisoner's dilemma., и . Biosyst., (января 2023)Distributed evolutionary algorithms and their models: A survey of the state-of-the-art., , , , , , и . Appl. Soft Comput., (2015)Generating Software Test Data by Particle Swarm Optimization., , , и . SEAL, том 8886 из Lecture Notes in Computer Science, стр. 37-47. Springer, (2014)Evolutionary computation for lifetime maximization of wireless sensor networks in complex 3D environments., , , и . GECCO (Companion), стр. 125-126. ACM, (2014)Multi-swarm particle swarm optimization with multiple learning strategies., , , и . GECCO (Companion), стр. 15-16. ACM, (2014)Tournament Selection Based Artificial Bee Colony Algorithm with Elitist Strategy., , , и . TAAI, том 8916 из Lecture Notes in Computer Science, стр. 387-396. Springer, (2014)Differential evolution using mutation strategy with adaptive greediness degree control., , , и . GECCO, стр. 73-80. ACM, (2014)A Multi-Label Learning Method Using Affinity Propagation and Support Vector Machine., , , и . IEEE Access, (2017)A splicing-driven memetic algorithm for reconstructing cross-cut shredded text documents., , , , и . Appl. Soft Comput., (2016)