Author of the publication

Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System.

, , , and . IAT Workshops, page 89-93. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An SRP-based energy-efficient scheduling algorithm for dependent real-time tasks., and . Int. J. Embed. Syst., 6 (4): 335-350 (2014)Quantifying Einstein-Podolsky-Rosen steering and expanding the scope of steerability of the two qubit state., , and . ICSAI, page 1165-1169. IEEE, (2016)Research on On-card Bytecode Verifier for Java Cards., , , and . J. Comput., 4 (6): 502-509 (2009)Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment., , , and . J. Networks, 7 (9): 1341-1348 (2012)Calibration of Small and Low-Cost UAV Video System for Real-Time Planimetric Mapping., , and . IGARSS, page 2068-2071. IEEE, (2006)A regularized optimization framework for tag completion and image retrieval., , , , and . Neurocomputing, (2015)A Multi-objective Particle Swarm Optimizer Based on Simulated Annealing and Decomposition., , , , and . CCIS, page 262-273. IEEE, (2018)Asymmetric Bayesian Learning for Image Retrieval with Relevance Feedback., and . MMM, volume 5916 of Lecture Notes in Computer Science, page 650-655. Springer, (2010)An Optimal Resource Allocation for Hybrid Digital-Analog With Combined Multiplexing., , , , and . IEEE Internet of Things Journal, 6 (1): 1125-1135 (2019)Building a topic-dependent maximum entropy model for very large corpora., and . ICASSP, page 777-780. IEEE, (2002)