Author of the publication

Identifying Intrusions in Computer Networks Using Robust Fuzzy PCA.

, , and . AICCSA, page 1261-1268. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A COOPERATIVE APPROACH TO EXTEND CELLULAR COVERAGE VIA D2D ARCHITECTURE BASED ON OLSR PROTOCOL, , and . International Journal of Computer Networks & Communications (IJCNC), 12 (5): 81-96 (September 2020)An automatic system for the determination of learner's sociological behavior from textual asynchronous conversations analysis in online collaborative learning., , , , , and . SITA, page 1-7. IEEE, (2014)Automatic generation of UML sequence diagrams from user stories in Scrum process., , and . SITA, page 1-6. IEEE, (2015)Identifying Intrusions in Computer Networks Using Robust Fuzzy PCA., , and . AICCSA, page 1261-1268. IEEE Computer Society, (2017)Performance Study of the Genetic Algorithm and the Levenverg-Marquardt Optimization Algorithm for the Calibration of a Rotating Camera., , and . CIST, page 472-476. IEEE, (2018)A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA., , and . CIST, page 636-641. IEEE, (2018)An effective DeepWINet CNN model for off-line text-independent writer identification., , , and . Pattern Anal. Appl., 26 (3): 1539-1556 (August 2023)An Assessment of Serious Games Technology: Toward an Architecture for Serious Games Design, , , and . International Journal of Computer Games Technology, (2018)Spatial-color mode detection in UV pairwise projection of the CIE LUV color space., , and . ICIoT, page 383-388. IEEE, (2020)Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block., , , and . ICMCS, page 255-260. IEEE, (2014)