Author of the publication

Weighted vote algorithm combination technique for anomaly based Smart Grid Intrusion Detection systems.

, , and . IJCNN, page 2738-2742. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Optimal Inter-Node Communication in Graph Partitioning Using Random Selection and Breadth-First Search., , , , and . Int. J. Parallel Program., 44 (4): 772-800 (2016)On Cloud-based Oversubscription., , and . CoRR, (2014)Weighted vote algorithm combination technique for anomaly based Smart Grid Intrusion Detection systems., , and . IJCNN, page 2738-2742. IEEE, (2016)FourD: do developers discuss design? revisited., , and . SWAN@SIGSOFT FSE, page 43-46. ACM, (2016)Path Optimization Sheaves., , , , , and . CoRR, (2020)Coding guidelines: finding the art in the science., and . Commun. ACM, 54 (12): 57-63 (2011)Classifying commit messages: A case study in resampling techniques., , and . IJCNN, page 1273-1280. IEEE, (2017)Simulating the Effects of Cloud-Based Oversubscription on Datacenter Revenues and Performance in Single and Multi-class Service Levels., , and . IEEE CLOUD, page 562-569. IEEE Computer Society, (2014)Contiki Cooja simulation for time bounded localization in wireless sensor network., , , , , and . SpringSim (CNS), page 1-7. SCS/ACM, (2015)Evaluation and design of highly reliable and highly utilized cloud computing systems., , , , and . J. Cloud Comput., (2015)