Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel MHC-Inspired Approach for Malicious Code Detection., , and . SERA (selected papers), volume 253 of Studies in Computational Intelligence, стр. 293-304. Springer, (2009)Immune Gravitation Inspired Optimization Algorithm., , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 178-185. Springer, (2011)Research of the Computer Virus Evolution Model Based on Immune Genetic Algorithm., и . ACIS-ICIS, стр. 9-13. IEEE Computer Society, (2011)A new super-extension of the KdV hierarchy., и . Appl. Math. Lett., 23 (6): 716-721 (2010)Modeling user multiple interests by an improved GCS approach., , , и . Expert Syst. Appl., 29 (4): 757-767 (2005)Multi-Task Hybrid Scheduling Scheme in FC-AE-1553 Multi-Level Switching Networks., , , , , , и . IEEE Access, (2023)Parametric multi-soliton solutions of a generalized Harry-Dym type equation., и . Appl. Math. Lett., (2021)A Method of Pathing for Underwater Glider Cluster Based on Optimization Algorithm., , , , , и . BIC-TA (2), том 2062 из Communications in Computer and Information Science, стр. 309-321. Springer, (2023)A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory., , , и . CIS, стр. 195-198. IEEE Computer Society, (2011)A Personalized Intelligent Web Retrieval System Based on the Knowledge-Base Concept and Latent Semantic Indexing Model., , и . SERA, стр. 45-50. IEEE Computer Society, (2009)