From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining., , , , , и . Inf. Sci., (2013)Computational intelligence applied to cybersecurity., , , , и . Expert Syst. J. Knowl. Eng., (2022)Artificial Intelligence as Catalyst for the Tourism Sector: A Literature Review., , , и . J. Univers. Comput. Sci., 29 (12): 1439-1460 (декабря 2023)MOVIH-IDS: A mobile-visualization hybrid intrusion detection system., , , и . Neurocomputing, 72 (13-15): 2775-2784 (2009)Special issue SOCO-CISIS 2018: New trends in soft computing and computational intelligence in security and its application in industrial and environmental problems., , , , , и . Neurocomputing, (2021)Humidity forecasting in a potato plantation using time-series neural models., , , , , и . J. Comput. Sci., (2022)Editorial: Special issue CISIS12-IGPL., , , , , и . Log. J. IGPL, 23 (1): 1-3 (2015)Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning., , , , , , , и . Log. J. IGPL, 30 (6): 1056-1073 (2022)Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans., , , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 109-117. Springer, (2011)Neural Analysis of HTTP Traffic for Web Attack Detection., , и . CISIS-ICEUTE, том 369 из Advances in Intelligent Systems and Computing, стр. 201-212. Springer, (2015)