Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems., , , , , , and . Int. J. Netw. Secur., 14 (5): 243-250 (2012)A Benchmark Comparison of 32-bit Microprocessors., , , and . IEEE Micro, 6 (4): 53-58 (1986)REMOTE: - A satellite based tsunami early detection system., , , and . IGARSS, page 3694-3697. IEEE, (2013)Investigation of the One-Armed Bandit by Neural Network., and . MICAI, volume 1793 of Lecture Notes in Computer Science, page 401-404. Springer, (2000)Prediction and animation of dynamical behavior of color diffusion in water using 2-D tightly coupled neural cellular network., , , and . SMC (6), page 5947-5951. IEEE, (2004)Hurricane tracking via backpropagation neural network., and . ICNN, page 1103-1106. IEEE, (1995)Integrated Software Vulnerability and Security Functionality Assessment., , , and . ISSRE, page 103-108. IEEE Computer Society, (2007)Forecasting airline seat show rates with neural networks., and . IJCNN, page 3974-3977. IEEE, (1999)Test Coverage Optimization for Large Code Problems., , , , , , and . AINA Workshops, page 215-220. IEEE Computer Society, (2012)Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks., , , , and . ICC, page 1-5. IEEE, (2010)