Author of the publication

A novel intrusion detection system based on hierarchical clustering and support vector machines.

, , , , , , and . Expert Syst. Appl., 38 (1): 306-313 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Anti-collision Algorithm in RFID Systems for Identifying Passive Tags., , , , , , , and . IEEE Trans. Ind. Informatics, 6 (1): 105-121 (2010)Temperature prediction and TAIFEX forecasting based on fuzzy relationships and MTPSO techniques., , , , , , , and . Expert Syst. Appl., 37 (4): 2756-2770 (2010)A novel intrusion detection system based on hierarchical clustering and support vector machines., , , , , , and . Expert Syst. Appl., 38 (1): 306-313 (2011)3D block-based medial axis transform and chessboard distance transform based on dominance., , , , , , , , and . Image Vis. Comput., 29 (4): 272-285 (2011)Hybrid GPS/GSM Positioning Systems Design with Fuzzy Logic., and . J. Adv. Comput. Intell. Intell. Informatics, 12 (3): 254-262 (2008)Hinfinity Filtering Approach for GSM Navigation Systems.. J. Adv. Comput. Intell. Intell. Informatics, 12 (3): 290-295 (2008)Image copyright protection with forward error correction., , , , , , and . Expert Syst. Appl., 36 (9): 11888-11894 (2009)AR game traffic characterization: a case of Pokémon Go in a flash crowd event., , , , and . MobiSys, page 493-494. ACM, (2021)Hybrid TDOA/AOA Mobile User Location with Artificial Neural Networks., and . ICNSC, page 847-852. IEEE, (2008)A product-coded WDM coding system., , and . IEEE Trans. Commun., 44 (1): 43-46 (1996)