Author of the publication

A fingerprinting system calls approach for intrusion detection in a cloud environment.

, , , and . CASoN, page 309-314. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-based Expert Systems, and . (0000)Two enhanced Differential Evolution variants for solving global optimization problems., , and . NaBIC, page 201-206. IEEE, (2011)ALEC: An Adaptive Learning Framework for Optimizing Artificial Neural Networks., and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 171-180. Springer, (2001)An LSB Data Hiding Technique Using Prime Numbers, , and . CoRR, (2010)D-SCIDS: Distributed soft computing intrusion detection system, , , and . Journal of Network and Computer Applications, 30 (1): 81--98 (January 2007)Evolving Intrusion Detection Systems, and . Genetic Systems Programming: Theory and Experiences, volume 13 of Studies in Computational Intelligence, Springer, Germany, Forthcoming.(2006)Particle Swarm Optimization and Differential Evolution Algorithms: Technical Analysis, Applications and Hybridization Perspectives., , and . Advances of Computational Intelligence in Industrial Systems, volume 116 of Studies in Computational Intelligence, (2008)Hardware Software Partitioning Problem in Embedded System Design Using Particle Swarm Optimization Algorithm., , , , and . CISIS, page 171-176. IEEE Computer Society, (2008)A hybrid framework for supporting scheduling in extended manufacturing environments., , , , and . HIS, page 213-218. IEEE, (2014)Metaheuristic Design of Feedforward Neural Networks: A Review of Two Decades of Research., , and . CoRR, (2017)