Author of the publication

Experimentation of Data Mining Technique for System's Security: A Comparative Study.

, , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 248-257. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving the max-cut problem using semidefinite optimization., and . CIST, page 768-772. IEEE, (2016)La Classification non Supervisée (Clustering) de Documents Textuels par les Automates Cellulaires., and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)An Approach based on Social Bees for an Intrusion Detection System by Scenario., , , and . IJOCI, 5 (3): 44-67 (2015)Coherent Route Cache In Dynamic Source Routing For Ad Hoc Networks., and . Comput. Sci. J. Moldova, 19 (3): 304-319 (2011)Annotation Sémantique De Pages Web., , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Numerical Experiments with a Primal-Dual Algorithm for Solving Quadratic Problems., and . ICORES, page 204-209. SciTePress, (2016)Web Services Selection Based on Context Ontology and Quality of Services., , and . Int. Arab J. e-Technol., 1 (3): 98-105 (2010)Evolving in Real Time a Neural Net Controller of Robot-Arm: Track and Evolve., and . Informatica, 15 (1): 63-76 (2004)On Demand ETL of RDB to RDF Mapping for Linked Enterprise Data., , , and . Int. J. Strateg. Inf. Technol. Appl., 8 (3): 91-100 (2017)Representation of textual documents by the approach wordnet and n-grams for the unsupervised classification (clustering) with 2D cellular automata: a comparative study., , , and . Computer and Information Science, 3 (3): 240-255 (2010)