From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An optimized neural network-based IDS against DDoS attacks., , , и . WINCOM, стр. 1-6. IEEE, (2023)A Review of Intrusion Detection Systems: Datasets and machine learning methods., , , и . NISS (ACM), стр. 7:1-7:6. ACM, (2021)Approach to integration SOLAP tools and multicriteria analysis for spatial decision support., , , и . AICCSA, стр. 1-6. IEEE Computer Society, (2013)A new preprocessing method reduces the dimensionality of classification models., , и . BDIoT, ACM, (2019)PyOPAsolver: A python based tool for ordinal priority approach operations and normalization., , , и . SoftwareX, (декабря 2022)Adaptive Region Growing based on detecting the seed point in the central trachea to the pre-segment respiratory system., , , и . ISIVC, стр. 1-5. IEEE, (2022)Minimizing the Overlapping Degree to Improve Class-Imbalanced Learning Under Sparse Feature Selection: Application to Fraud Detection., , , , , и . IEEE Access, (2021)CDT to Detect Co-residence in Cloud Computing., , и . SCA, том 37 из Lecture Notes in Networks and Systems, стр. 313-323. Springer, (2017)A new integrated methodology using modified Delphi-fuzzy AHP-PROMETHEE for Geospatial Business Intelligence selection., , , и . Inf. Syst. E Bus. Manag., 15 (4): 897-925 (2017)Unsupervised image segmentation using Fuzzy Hidden Markov Chain with bi-dimensional data., , , и . ISIVC, стр. 1-6. IEEE, (2022)