Author of the publication

A rough set theory based method for anomaly intrusion detection in computer network systems.

, , , , and . Expert Syst. J. Knowl. Eng., 20 (5): 251-259 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Form-Factors for General Environments., , and . Eurographics, North-Holland / Eurographics Association, (1988)Multi-Time Scale Trading Simulation of Source Grid Load Storage Based on Continuous Trading Mechanism for China., , , , , and . Sensors, 22 (6): 2363 (2022)Design of purchasing costs analysis system for grid companies., , , and . A-SSCC, page 295-299. IEEE, (2012)HSAEP: a new platform to evaluate hybrid simulation algorithms., , , and . Frontiers Comput. Sci., 15 (5): 155211 (2021)A Parallel Pairwise Alignment with Pruning for Large Genomic Sequences., , , , and . PDCAT, page 243-248. IEEE Computer Society, (2017)Configurable data exchange tool design based on tagged data structure., , and . A-SSCC, page 311-314. IEEE, (2012)An Image Encryption Scheme with the Associated Thumbnail., , , and . ICSAI, page 1-8. IEEE, (2022)Network Embedding via Motifs., , , and . ACM Trans. Knowl. Discov. Data, 16 (3): 44:1-44:20 (2022)A rough set theory based method for anomaly intrusion detection in computer network systems., , , , and . Expert Syst. J. Knowl. Eng., 20 (5): 251-259 (2003)Artificial Neural Network Analysis of immobilized lipase catalyzed Synthesis of biodiesel from Rapeseed Soapstock., , , and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1239-1249. Springer, (2008)