Author of the publication

A feasible intrusion detector for recognizing IIS attacks based on neural networks.

, , , , and . Comput. Secur., 27 (3-4): 84-100 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on "Effect of system imperfections on BER performance of a CDMA receiver with multipath diversity combining"., , and . IEEE Trans. Vehicular Technology, 52 (5): 1414-1415 (2003)An Exponential Model for Evaluating Error Performance of Turbo Codes., , , and . GLOBECOM, page 1-5. IEEE, (2010)Capacity evaluation of packet-switched CDMA system., and . IEEE Communications Letters, 5 (8): 334-336 (2001)Further constructions of optimal variable-weight optical orthogonal codes., , , and . IWSDA, page 130-133. IEEE, (2011)Joint time and frequency domain double differential detection and equalization for DFT scrambling vector OFDM under fast fading channels., , and . IWSDA, page 122-125. IEEE, (2013)Theoretical bound on no hit zone of frequency hopping sequences., , , and . IWSDA, page 115-117. IEEE, (2011)On the performance of type-III hybrid ARQ with RCPC codes., and . PIMRC, page 1297-1301. IEEE, (2003)Random Beamforming in Millimeter-Wave NOMA Networks., , and . CoRR, (2016)A More Realistic Thinning Scheme for Call Admission Control in Multimedia Wireless Networks., , and . IEEE Trans. Computers, 57 (8): 1143-1147 (2008)Call dropping performance of the relay station (RS)-first channel access scheme in LTE-Advanced relay networks., , , and . ATNAC, page 1-6. IEEE, (2011)