From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Business protocol discovery from log files using a TF-IDF-based technique., , и . ICUFN, стр. 651-656. IEEE, (2015)On the use of character n-grams as the only intrinsic evidence of plagiarism., , и . Lang. Resour. Evaluation, 53 (3): 363-396 (2019)Collaborative Life-Cycle-Based Botnet Detection in IoT Using Event Entropy., , и . Int. J. Organ. Collect. Intell., 10 (4): 19-34 (2020)A Binary Cuckoo Search Algorithm for Graph Coloring Problem., , и . Int. J. Appl. Evol. Comput., 5 (3): 42-56 (2014)Solving 0-1 knapsack problems by a discrete binary version of cuckoo search algorithm., , и . Int. J. Bio Inspired Comput., 4 (4): 229-236 (2012)A study of LoRaWAN protocol performance for IoT applications in smart agriculture., , , и . Comput. Commun., (2020)Latent semantic analysis for business protocol discovery using log files., , и . Int. J. Web Eng. Technol., 9 (4): 365-396 (2014)A new large Arabic database for offline handwriting recognition., , и . IJAPR, 1 (1): 81-98 (2013)Optimizing geographic routing protocols for urban VANETs using stigmergy, social behavior and adaptive C-n-F mechanisms: An optimized CLWPR., и . Veh. Commun., (2018)A New Information-Based Heuristic for Distributed DDoS Detection and Mitigation: Distributed and Collaborative DDoS Detection., , и . Int. J. Organ. Collect. Intell., 12 (4): 1-16 (2022)