Author of the publication

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.

, , , , , and . CCIS, page 234-238. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational studies on the dimers and the thermal dimerization of norbornadiene., , and . J. Comput. Chem., 29 (8): 1250-1258 (2008)Wind Power Smoothing by Controlling the Inertial Energy of Turbines With Optimized Energy Yield., , , and . IEEE Access, (2017)How to Increase Interest in Studying Functional Programming via Interdisciplinary Application., , , , , and . TFPIE, volume 321 of EPTCS, page 37-54. (2020)Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features.. J. Cyber Secur. Mobil., 12 (5): 697-710 (2023)A theoretical study of solvent effects on tautomerism and electronic absorption spectra of 3-hydroxy-2-mercaptopyridine and 2, 3-dihydroxypyridine., , , , and . J. Comput. Chem., 25 (15): 1833-1839 (2004)Mechanisms of norbornadiene dimerization to Binor-S using cationic CoI, RhI, and IrI catalysts., , , , and . J. Comput. Chem., 31 (12): 2248-2257 (2010)Theoretical studies on the gas-phase pyrolysis of 2-phenoxycarboxylic acids: An ONIOM approach., , , and . J. Comput. Chem., 24 (8): 963-972 (2003)Effect of training data size and noise level on support vector machines virtual screening of genotoxic compounds from large compound libraries., , , , , , , , , and . J. Comput. Aided Mol. Des., 25 (5): 455-467 (2011)Cost Optimization Control of Logistics Service Supply Chain Based on Cloud Genetic Algorithm., and . Wireless Personal Communications, 102 (4): 3171-3186 (2018)Mechanism for the reaction of 2-naphthol with N-methyl-N-phenyl-hydrazine suggested by the density functional theory investigations., , , , , and . Journal of Computational Chemistry, 33 (2): 220-230 (2012)