From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ECFGM: enriched control flow graph miner for unknown vicious infected code detection., и . J. Comput. Virol., 8 (3): 99-108 (2012)Detecting intrusion transactions in databases using data item dependencies and anomaly analysis., , , и . Expert Syst. J. Knowl. Eng., 25 (5): 460-473 (2008)Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches, и . CoRR, (2012)Security Framework of IoT-Based Smart Home., , и . IST, стр. 251-256. IEEE, (2020)Evaluation of random forest classifier in security domain., , и . Appl. Intell., 47 (2): 558-569 (2017)Active Spectral Botnet Detection Based on Eigenvalue Weighting., , , , , и . Handbook of Big Data Privacy, Springer, (2020)Two-tier network anomaly detection model: a machine learning approach., , и . J. Intell. Inf. Syst., 48 (1): 61-74 (2017)Proposing a sparse representational based face verification system to run in a shortage of memory., и . Multimedia Tools Appl., 79 (3-4): 2965-2985 (2020)An Efficient Distributed Algorithm for Mining Association Rules., , и . ISPA, том 4330 из Lecture Notes in Computer Science, стр. 383-393. Springer, (2006)Artificial Prediction Markets for Clustering., , и . Australasian Conference on Artificial Intelligence, том 9992 из Lecture Notes in Computer Science, стр. 365-377. Springer, (2016)