Author of the publication

Immunity-Based Model for Malicious Code Detection.

, , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 399-406. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Design and Implementation of Embedded Control Systems with Scilab, , and . CoRR, (2008)Neural Network Based Feedback Scheduler for Networked Control System with Flexible Workload., , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 242-251. Springer, (2005)Rich Mobile Applications: Genesis, taxonomy, and open issues., , , , and . J. Netw. Comput. Appl., (2014)Monocular Vision Aided Autonomous UAV Navigation in Indoor Corridor Environments., , , , and . IEEE Trans. Sustain. Comput., 4 (1): 96-108 (2019)TAP: Traffic Accident Profiling via Multi-Task Spatio-Temporal Graph Representation Learning., , , , , , and . ACM Trans. Knowl. Discov. Data, 17 (4): 56:1-56:25 (May 2023)Network Representation Learning: From Traditional Feature Learning to Deep Learning., , , , , and . IEEE Access, (2020)Mobile Multimedia Recommendation in Smart Communities: A Survey., , , , and . IEEE Access, (2013)Attributed Collaboration Network Embedding for Academic Relationship Mining., , , , , , and . ACM Trans. Web, 15 (1): 4:1-4:20 (2021)Quantifying the impact of scientific collaboration and papers via motif-based heterogeneous networks., , , and . J. Informetrics, 17 (2): 101397 (May 2023)User popularity-based packet scheduling for congestion control in ad-hoc social networks., , , , , , and . J. Comput. Syst. Sci., 82 (1): 93-112 (2016)