Author of the publication

A clustering-based method for unsupervised intrusion detections.

, , , , and . Pattern Recognit. Lett., 27 (7): 802-810 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Similarity calculation of fusion sentence surface information and the syntax structure., , , and . ICMLC, page 773-778. IEEE, (2012)A Transaction Scheduling Algorithm with Temporal Constraints in Real-time Database Systems., and . CIT, page 940-945. IEEE Computer Society, (2004)A Gravity-Based Intrusion Detection Method., , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 522-529. Springer, (2004)A New Task Scheduling Algorithm in Distributed Computing Environments., and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 141-144. Springer, (2003)Real Time Approaches for Time-Series Mining-Based IDS., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 879-882. Springer, (2004)An improved whale optimisation algorithm for distributed assembly flow shop with crane transportation., , , , and . Int. J. Autom. Control., 15 (6): 710-743 (2021)Reference governor for second order constrained linear systems with small input time delays., , , and . ICMLC, page 1022-1027. IEEE, (2013)A clustering-based method for unsupervised intrusion detections., , , , and . Pattern Recognit. Lett., 27 (7): 802-810 (2006)Optimal Parallel Algorithm for the Knapsack Problem Without Memory Conflicts., , and . J. Comput. Sci. Technol., 19 (6): 760-768 (2004)Commitment in Cooperative Problem Solving., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 993-996. Springer, (2004)