Author of the publication

Intrusion Detection Based on Immune Clonal Selection Algorithms.

, , and . Australian Conference on Artificial Intelligence, volume 3339 of Lecture Notes in Computer Science, page 1226-1232. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path relinking approach for multiple allocation hub maximal covering problem., and . Comput. Math. Appl., 57 (11-12): 1890-1894 (2009)Test Case Prioritization for Black Box Testing., , , and . COMPSAC (1), page 465-474. IEEE Computer Society, (2007)Intrusion Detection Based on Immune Clonal Selection Algorithms., , and . Australian Conference on Artificial Intelligence, volume 3339 of Lecture Notes in Computer Science, page 1226-1232. Springer, (2004)Predicting Higher-order Dynamics without Network Topology by Ridge Regression., , , and . ISCAS, page 1-5. IEEE, (2024)On Efficient Processing of Multiple KNN Queries in Constrained Spatial Networks., , , , and . FSKD (4), page 261-265. IEEE Computer Society, (2008)978-0-7695-3305-6.A Dynamic Adjusting Method for Test Case Prioritization., , , and . SEKE, page 484-487. Knowledge Systems Institute Graduate School, (2008)Design and implementation of embedded secure web server for ARM platform., and . EMEIT, page 359-362. IEEE, (2011)An Improved Metric for Test Case Prioritization., and . WISA, page 125-130. IEEE Computer Society, (2011)An Encrypted Traffic Classification Framework Based on Higher-Interaction-Graph Neural Network., , , and . ACISP (3), volume 14897 of Lecture Notes in Computer Science, page 383-403. Springer, (2024)Research on image segmentation algorithm based on fuzzy clustering.. ICDIP, volume 8878 of SPIE Proceedings, page 88784I. SPIE, (2013)