From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Network Intrusion Detection Based on Improved Nonlinear Fuzzy Robust PCA., , и . CIST, стр. 636-641. IEEE, (2018)An effective cyber attack detection system based on an improved OMPCA., , и . WINCOM, стр. 1-6. IEEE, (2017)Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis., , , , и . WINCOM, стр. 1-7. IEEE, (2023)An Approach for intrusion detection using machine learning algorithms., , и . WINCOM, стр. 1-6. IEEE, (2023)Impact of security and privacy risks on the adoption of IoT: A state of the art., и . WINCOM, стр. 1-5. IEEE, (2022)Detection of Timestamps Tampering in NTFS using Machine Learning., и . EUSPN/ICTH, том 160 из Procedia Computer Science, стр. 778-784. Elsevier, (2019)Intrusion detection system using PCA and Fuzzy PCA techniques., , и . ACOSIS, стр. 1-7. IEEE, (2016)Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach., , , и . ICICM, стр. 132-136. ACM, (2019)Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms., , и . WINCOM, стр. 1-5. IEEE, (2023)Identifying Intrusions in Computer Networks Using Robust Fuzzy PCA., , и . AICCSA, стр. 1261-1268. IEEE Computer Society, (2017)