Author of the publication

Network Intrusion Detection using Fuzzy Class Association Rule Mining Based on Genetic Network Programming.

, , , , and . SMC, page 60-67. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Passwords Through Enhanced Hashing., , and . LISA, page 93-106. USENIX Association, (2009)带有区间信息的软件质量评价模型 (Evaluation Model of Software Quality with Interval Data)., and . 计算机科学, 46 (10): 209-214 (2019)Attribute Normalization Approaches to Group Decision-making and Application to Software Reliability Assessment.. Cogn. Comput., 13 (1): 139-163 (2021)Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders., , , and . Proc. Priv. Enhancing Technol., 2022 (3): 99-119 (2022)Anomaly Detection and Attack Classification for Train Real-Time Ethernet., , , , and . IEEE Access, (2021)A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription., , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW2): 1-43 (2023)No Time Limit and Time Limit Model of Multiple Round Dutch Auction Based on Genetic Network Programming., , , and . J. Adv. Comput. Intell. Intell. Informatics, 15 (1): 3-12 (2011)An intuitionistic fuzzy projection-based approach and application to software quality evaluation.. Soft Comput., 24 (1): 429-443 (2020)Runtime Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory., , , and . HPDC, page 183-194. IEEE, (2006)A Security Analysis of Two Commercial Browser and Cloud Based Password Managers., , and . SocialCom, page 448-453. IEEE Computer Society, (2013)