Author of the publication

Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach.

, , , , and . ICT, page 552-558. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Object Support in the RAID Distributed Database System., , , and . ICSI, page 368-377. IEEE Computer Society, (1990)Tamper-resistant autonomous agents-based mobile-cloud computing., , and . NOMS, page 843-847. IEEE, (2016)Special issue on networking technologies for sustainable computing., , , and . Sustain. Comput. Informatics Syst., (2020)RADical Strategies for Engineering Web-Scale Cloud Solutions., , , and . IEEE Cloud Comput., 2 (5): 20-29 (2015)PassGoodPool: Joint Passengers and Goods Fleet Management with Reinforcement Learning aided Pricing, Matching, and Route Planning., , , and . CoRR, (2020)A time-evolution model for the privacy degree of information disseminated in online social networks., , , and . Int. J. Commun. Networks Distributed Syst., 11 (4): 412-430 (2013)Guest Editorial: Reliability Issues in Distributed Systems.. IEEE Trans. Software Eng., 8 (3): 165-167 (1982)Applying Machine Learning and Data Fusion to the "Missing Person" Problem., , , , and . Computer, 55 (6): 40-55 (2022)Communication Costs in Digital Library Databases, and . DEXA, volume 978 of Lecture Notes in Computer Science, page 1-13. Springer, (1995)A Colour-Based Technique for Measuring Visible Loss for Use in Image Data Communication., , and . DEXA, volume 1134 of Lecture Notes in Computer Science, page 39-48. Springer, (1996)