Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rule-Based Ontology for Context-Aware Computing., , , and . BMEI, page 1-4. IEEE, (2009)A Framework of Intelligent Agent Based Middleware for Context Aware Computing., , and . ICNC (6), page 107-110. IEEE Computer Society, (2009)Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment., , and . J. Comput., 7 (10): 2397-2403 (2012)A Clustering Algorithm Use SOM and K-Means in Intrusion Detection., , , and . ICEE, page 1281-1284. IEEE Computer Society, (2010)Botnet Detection Based on Analysis of Mail Flow., , and . BMEI, page 1-4. IEEE, (2009)A Clustering Algorithm Use SOM and K-Means in Intrusion Detection., , , and . ICEE, page 1281-1284. IEEE Computer Society, (2010)A Wireless Network Congestion Control Algorithm Based on Adaptive QoS and Wireless Bandwidth., , and . BMEI, page 1-4. IEEE, (2009)SVM Classifier Incorporating Feature Selection Using GA for Spam Detection., , and . EUC, volume 3824 of Lecture Notes in Computer Science, page 1147-1154. Springer, (2005)A Classification Method of Multispectral Images Which Is Based on Fuzzy SVM., and . CSSE (1), page 815-818. IEEE Computer Society, (2008)An Investigation of Assistive Products for the Elderly., , , , and . TrustCom, page 1509-1514. IEEE, (2020)