Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating Monthly Production of Oil Wells., , , , and . IFSA (2), volume 42 of Advances in Soft Computing, page 393-403. Springer, (2007)Intrusion Detection Systems Using Adaptive Regression Splines., , , and . ICEIS (3), page 26-33. (2004)Detecting Spatial Outliers Using Bipartite Outlier Detection Methods., , and . IKE, page 236-244. CSREA Press, (2004)Finding the Critical Sampling of Big Datasets., , and . Conf. Computing Frontiers, page 355-360. ACM, (2017)How the tables have turned: studying the new wave of social bots on Twitter using complex network analysis techniques., , , and . ASONAM, page 501-508. ACM, (2019)Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks., and . SAINT, page 209-217. IEEE Computer Society, (2003)Polymorphic Malicious Executable Scanner by API Sequence Analysis., , , and . HIS, page 378-383. IEEE Computer Society, (2004)Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting., , , and . IJCNN, page 3352-3357. IEEE, (2008)A Comparative Study of Techniques for Intrusion Detection., and . ICTAI, page 570-. IEEE Computer Society, (2003)Feature Mining and Intelligent Computing for MP3 Steganalysis., , and . IJCBS, page 627-630. IEEE Computer Society, (2009)