Author of the publication

Alternative tests for the significance of the intraclass correlation coefficients under unequal family sizes.

, , , and . Commun. Stat. Simul. Comput., 53 (1): 409-426 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Pattern Classifiers: Methods and Algorithms.. Technometrics, 47 (4): 517-518 (2005)Classifying UNSW-NB15 Network Traffic in the Big Data Framework Using Random Forest in Spark., , , , and . Int. J. Big Data Intell. Appl., 2 (1): 39-61 (2021)Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework., , , , , , , and . Sensors, 22 (20): 7999 (2022)Classifying Phishing Email Using Machine Learning and Deep Learning., , , and . Cyber Security, page 1-2. IEEE, (2019)Using locality sensitive hashing to improve the KNN algorithm in the mapreduce framework., , and . ACM Southeast Regional Conference, page 32:1. ACM, (2018)A hybrid genetic algorithm for network intrusion detection., , and . ACM Southeast Regional Conference, page 34:1. ACM, (2018)Classification using first-stage rank nearest neighbor rule for multiple classes.. Pattern Recognit. Lett., 14 (7): 537-544 (1993)Using a cosine-type measure to derive strong association mining rules., , , and . Int. J. Knowl. Eng. Data Min., 1 (1): 69-83 (2010)Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework., , , , , , , and . Data, 8 (1): 18 (January 2023)Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data., , , and . Comput., 12 (10): 204 (September 2023)