From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protocols and Architectures for Next-Generation Wireless Sensor Networks., , , , и . IJDSN, (2014)Binary PSO and random forests algorithm for PROBE attacks detection in a network., , и . IEEE Congress on Evolutionary Computation, стр. 662-668. IEEE, (2011)A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network., и . SMC, стр. 2473-2478. IEEE, (2013)A Solution to Bipartite Drawing Problem Using Genetic Algorithm., , , и . ICSI (1), том 6728 из Lecture Notes in Computer Science, стр. 530-538. Springer, (2011)A Comprehensive Survey on Security in Cloud Computing., , и . FNC/MobiSPC, том 110 из Procedia Computer Science, стр. 465-472. Elsevier, (2017)Query Processing Systems for Wireless Sensor Networks., и . UCMA (1), том 150 из Communications in Computer and Information Science, стр. 273-282. (2011)Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs., и . TrustCom, стр. 1181-1187. IEEE Computer Society, (2012)Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery., , и . ICOIN, том 5200 из Lecture Notes in Computer Science, стр. 213-222. Springer, (2007)A novel intrusion detection framework for wireless sensor networks., , , и . Pers. Ubiquitous Comput., 17 (5): 907-919 (2013)Neural Networks for Optimization Problem with Nonlinear Constraints., , , , и . ICONIP (2), том 4233 из Lecture Notes in Computer Science, стр. 1014-1021. Springer, (2006)