Author of the publication

A novel intrusion detection system based on hierarchical clustering and support vector machines.

, , , , , , and . Expert Syst. Appl., 38 (1): 306-313 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Hiding Using Flexible Multi-bit MER., , , and . ISBAST, page 24-31. IEEE, (2013)An O(1) Time Parallel Algorithm for the 3D Euclidean Distance Transform on the AROB*., and . PDPTA, page 1120-1126. CSREA Press, (2002)Efficient Parallel Algorithms for the Algebraic Path Problems on a Hyper-bus Broadcast Network., , , , and . PDPTA, page 1386-1397. CSREA Press, (1996)Optimal Finding the All-Pair Shortest Path for Interval Graphs on a Reconfigurable Array of Processors with Wider Bus Networks., , , and . PDPTA, page 1374-1385. CSREA Press, (1996)Medial Axis Transform on Mesh-Connected Computers with Hyperbus Broadcasting., and . Computing, 59 (2): 95-114 (1997)Designing Efficient Parallel Algorithms on CRAP., , , and . IEEE Trans. Parallel Distributed Syst., 6 (5): 554-560 (1995)Optimal Algorithms for the Channel-Assignment Problem on a Reconfigurable Array of Processors with Wider Bus Networks., , , and . IEEE Trans. Parallel Distributed Syst., 13 (11): 1124-1138 (2002)An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization., , , , , and . IEEE Trans. Multim., 10 (5): 746-757 (2008)An efficient wavelet-tree-based watermarking method., , , , , and . Expert Syst. Appl., 38 (12): 14357-14366 (2011)An Identity-Based and Revocable Data-Sharing Scheme in VANETs., , and . IEEE Trans. Veh. Technol., 69 (12): 15933-15946 (2020)