From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Threats and Detection for Industrial Mobile-IoT Networks., , , , и . IEEE Access, (2018)Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)., , и . NSS, стр. 442-449. IEEE Computer Society, (2010)A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection., , , , , и . Future Gener. Comput. Syst., (2018)Smokers' Characteristics and Cluster Based Quitting Rule Discovery Model for Enhancement of Government's Tobacco Control Systems., , и . PACIS, стр. 26. AISeL, (2010)Process Performance Evaluation Using Evolutionary Algorithm., , , , и . IKE, стр. 731-737. CSREA Press, (2009)An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy., , , , , и . Artif. Intell. Medicine, 58 (3): 185-193 (2013)Hybrids of support vector machine wrapper and filter based framework for malware detection., , , , , и . Future Gener. Comput. Syst., (2016)An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches., , , и . Appl. Soft Comput., (2020)Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches., , , , и . IEEE Access, (2020)A hybrid wrapper-filter approach to detect the source(s) of out-of-control signals in multivariate manufacturing process., , , , , и . Eur. J. Oper. Res., 237 (3): 857-870 (2014)