Author of the publication

A rough set theory based method for anomaly intrusion detection in computer network systems.

, , , , and . Expert Syst. J. Knowl. Eng., 20 (5): 251-259 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of affine iterative closest point algorithm for partial registration., , and . IET Comput. Vis., 11 (2): 135-144 (2017)A Study of the Consistency in Keystroke Dynamics., , and . CCBR, volume 8232 of Lecture Notes in Computer Science, page 409-416. Springer, (2013)Gender recognition using motion data from multiple smart devices., , and . Expert Syst. Appl., (2020)Integrating Handcrafted Features with Deep Representations for Smartphone Authentication., and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 27:1-27:27 (2022)Integrating Gaze and Mouse Via Joint Cross-Attention Fusion Net for Students' Activity Recognition in E-learning., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (3): 145:1-145:35 (September 2023)Reading Personality Preferences From Motion Patterns in Computer Mouse Operations., , and . IEEE Trans. Affect. Comput., 13 (3): 1619-1636 (2022)Learning Fundamental Visual Concepts Based on Evolved Multi-Edge Concept Graph., , , , and . IEEE Trans. Multim., (2021)From big data to knowledge: A spatio-temporal approach to malware detection., , , , and . Comput. Secur., (2018)I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios., , , and . CHI, page 1-13. ACM, (2020)A Deep Learning Approach to Web Bot Detection Using Mouse Behavioral Biometrics., , and . CCBR, volume 11818 of Lecture Notes in Computer Science, page 388-395. Springer, (2019)