Author of the publication

Comparison of Two Feature Selection Methods in Intrusion Detection Systems.

, , , and . CIT, page 83-86. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparison of Resampling Methods for Clustering Ensembles., , and . IC-AI, page 939-945. CSREA Press, (2004)Performance Analysis of Decision Tree for Intrusion Detection with Reduced DARPA Offline Feature Sets., , , and . IMECS, page 679-684. Newswood Limited, (2007)Applying Personalized Recommendation for Social Network Marketing., , and . Int. J. Online Mark., 2 (1): 50-63 (2012)Association Rule Analysis for an Online Education System., , and . IRI, page 504-509. IEEE Systems, Man, and Cybernetics Society, (2004)A Farsi part-of-speech tagger based on Markov model., , , and . SAC, page 1588-1589. ACM, (2008)Using Clustering for Generating Diversity in Classifier Ensemble., , and . JDCTA, 3 (1): 51-57 (2009)Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism., and . Expert Syst. Appl., (2018)Offering a hybrid approach of data mining to predict the customer churn based on bagging and boosting methods., , and . Kybernetes, 45 (5): 732-743 (2016)What is the impact of service quality on customers' satisfaction during COVID-19 outbreak? New findings from online reviews analysis., , , , , , , and . Telematics Informatics, (2021)Ball*-tree: Efficient spatial indexing for constrained nearest-neighbor search in metric spaces, , and . arXiv preprint arXiv:1511.00628, (2015)