Author of the publication

A Novel Scheme for Secured Data Transfer Over Computer Networks.

, , and . J. Univers. Comput. Sci., 11 (1): 104-121 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rule-based Expert Systems, and . (0000)D-SCIDS: Distributed soft computing intrusion detection system, , , and . Journal of Network and Computer Applications, 30 (1): 81--98 (January 2007)Evolving Intrusion Detection Systems, and . Genetic Systems Programming: Theory and Experiences, volume 13 of Studies in Computational Intelligence, Springer, Germany, Forthcoming.(2006)Global Optimisation of Neural Networks Using a Deterministic Hybrid Approach., and . HIS, page 79-92. Physica-Verlag, (2001)Web Traffic Mining Using a Concurrent Neuro-Fuzzy Approach., , and . HIS, volume 87 of Frontiers in Artificial Intelligence and Applications, page 853-862. IOS Press, (2002)Adaptive Database Learning in Decision Support Systems Using Evolutionary Fuzzy Systems: A Generic Framework., , and . HIS, page 237-251. Physica-Verlag, (2001)Soft Computing for Developing Short Term Load Forecasting Models in Czech Republic., , and . HIS, page 207-221. Physica-Verlag, (2001)Optimizing Linear Prgramming Technique Using Fuzzy Logic., and . HIS, page 269-283. Physica-Verlag, (2001)Complex learning in connectionist networks.. Neurocomputing, (2014)Intrusion detection using error correcting output code based ensemble., and . HIS, page 181-186. IEEE, (2014)