From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks., и . IEEE Trans. Ind. Informatics, 10 (2): 1337-1347 (2014)The Adaptive Critic Learning Agent (ACLA) algorithm: Towards problem independent neural network based optimizers., и . IJCNN, стр. 1-7. IEEE, (2012)Intelligent control in automation based on wireless traffic analysis., и . ETFA, стр. 249-256. IEEE, (2007)Descending Deviation Optimization techniques for scheduling problems., и . ETFA, стр. 257-260. IEEE, (2008)Neural Network Real Time Video Processor for Early Aircraft Detection., и . ETFA, стр. 1-4. IEEE, (2009)Neural Network Approach to Locating Cryptography in Object Code., и . ETFA, стр. 1-4. IEEE, (2009)Vulnerability identification and classification via text mining bug databases., , и . IECON, стр. 3612-3618. IEEE, (2014)Centroid density of interval type-2 fuzzy sets: Comparing stochastic and deterministic defuzzification., и . FUZZ-IEEE, стр. 1560-1567. IEEE, (2011)Neural Network based Intrusion Detection System for critical infrastructures., , и . IJCNN, стр. 1827-1834. IEEE Computer Society, (2009)Next Generation Emergency Communication Systems via Software Defined Networks., , , , , , , и . GREE, стр. 1-8. IEEE Computer Society, (2014)