Author of the publication

TCM-KNN Algorithm for Supervised Network Intrusion Detection.

, , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 141-151. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting next-day discharge via electronic health record access logs., , , , and . J. Am. Medical Informatics Assoc., 28 (12): 2670-2680 (2021)Building bridges across electronic health record systems through inferred phenotypic topics., , , , , , , , , and . J. Biomed. Informatics, (2015)Network anomaly detection based on TCM-KNN algorithm., , , and . AsiaCCS, page 13-19. ACM, (2007)Telehealth Use in the COVID-19 Pandemic: A Retrospective Study of Prenatal Care., , , and . MedInfo, volume 290 of Studies in Health Technology and Informatics, page 503-507. IOS Press, (2021)GATS-C4.5: An Algorithm for Optimizing Features in Flow Classification., , and . CCNC, page 466-470. IEEE, (2008)Provider Networks in the Neonatal Intensive Care Unit Associate with Length of Stay., , , , , and . CIC, page 127-134. IEEE, (2019)Optimizing IP Flow Classification Using Feature Selection., , and . PDCAT, page 39-45. IEEE Computer Society, (2007)Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks., , , , , and . ICC, page 1-6. IEEE, (2020)Rubik: Knowledge Guided Tensor Factorization and Completion for Health Data Analytics., , , , , , , and . KDD, page 1265-1274. ACM, (2015)Detecting Drug-Drug Interactions in COVID-19 Patients., , , , , and . MedInfo, volume 290 of Studies in Health Technology and Informatics, page 330-334. IOS Press, (2021)