From post

A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis.

, , , и . IC-AI, стр. 490-495. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Databases using Novell Netware., и . Applied Informatics, стр. 273-275. IASTED/ACTA Press, (1994)Detecting Botnet Activities Based on Abnormal DNS traffic, , , и . CoRR, (2009)kENFIS: kNN-based evolving neuro-fuzzy inference system for computer worms detection., , и . J. Intell. Fuzzy Syst., 26 (4): 1893-1908 (2014)Study on Advanced Visualization Tools In Network Monitoring Platform., , , и . EMS, стр. 445-449. IEEE Computer Society, (2009)Novel algorithms to ensure smooth and unobtrusive handover among positioning systems., , , и . CAMP, стр. 229-234. IEEE, (2012)A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis., , , и . IC-AI, стр. 490-495. CSREA Press, (2008)Simulation of routing in nano-manipulation for creating pattern with atomic force microscopy using hybrid PSO-AS., , , , и . SpringSim (ANSS), стр. 213-219. SCS/ACM, (2011)1-930638-56-6.Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining., , , , и . J. Comput. Sci., 9 (4): 421-426 (2013)A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks., , и . ICCSCE, стр. 168-170. IEEE, (2011)Socket Level Implementation of MCS Conferencing System in IPv6., , и . ICOIN, том 2662 из Lecture Notes in Computer Science, стр. 460-472. Springer, (2003)