Author of the publication

Intrusion Detection at Packet Level by Unsupervised Architectures.

, , , , , and . IDEAL, volume 4881 of Lecture Notes in Computer Science, page 718-727. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Image-Recognition System Implemented on Hierarchical Parallel Architectures., , and . IJPRAI, 12 (3): 293-310 (1998)Integration of Territorial Maps in the Vision System of an Autonomous Land Vehicle., , , , and . IAS, page 694-704. IOS Press, (1989)No-reference image quality assessment based on localized gradient statistics: application to JPEG and JPEG2000., , , , and . Human Vision and Electronic Imaging, volume 7527 of SPIE Proceedings, page 75271. SPIE, (2010)A Comprehensive Framework for the Security Risk Management of Cyber-Physical Systems., , , , and . Resilience of Cyber-Physical Systems, Springer, (2019)Parallel architectures for vector quantization., , and . ICNN, page 899-903. IEEE, (1997)Random-based networks with dropout for embedded systems., , , and . Neural Comput. Appl., 33 (12): 6511-6526 (2021)Color Distribution Information for the Reduced-Reference Assessment of Perceived Image Quality., , , and . IEEE Trans. Circuits Syst. Video Technol., 20 (12): 1757-1769 (2010)A multiprocessor-oriented visual tracking system., and . IEEE Trans. Ind. Electron., 46 (4): 842-850 (1999)Associative structures for vision., , and . Multidimens. Syst. Signal Process., 5 (1): 75-96 (1994)Adaptive Internal Representation in Circular Back-Propagation Networks., , and . Neural Comput. Appl., 3 (4): 222-333 (1995)