Author of the publication

A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory.

, , , and . Secur. Commun. Networks, 9 (15): 2627-2640 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ART2 Network Based on Memorizing-Forgetting Mechanism., , and . ISNN (1), volume 6675 of Lecture Notes in Computer Science, page 60-67. Springer, (2011)Origin and Evolution of Conceptual Differences Between Two Measurement Theories., , , and . FSDM, volume 331 of Frontiers in Artificial Intelligence and Applications, page 66-77. IOS Press, (2020)An Improved Genetic Algorithm for the Recovery System of USVs Based on Stern Ramp Considering the Influence of Currents., , , , , and . Sensors, 23 (19): 8075 (October 2023)Improved SPECAN imaging algorithm for missile-borne SAR with squint angle., , , , and . ICCA, page 107-111. IEEE, (2014)Bilevel mixed-integer nonlinear programming for integrated scheduling in a supply chain network., , , and . Clust. Comput., 22 (6): 15517-15532 (2019)An Autonomous Recovery Guidance System for USV Based on Optimized Genetic Algorithm., , , and . CICAI (2), volume 14474 of Lecture Notes in Computer Science, page 258-270. Springer, (2023)Algorithm for detecting anomalous hosts based on group activity evolution., , , , , , , and . Knowl. Based Syst., (2021)An Off-Line Programming System for the Robotic Cutting of Complex Shape Parts with Exact Mathematical Model., , , and . ICIRA (2), volume 9245 of Lecture Notes in Computer Science, page 130-141. Springer, (2015)A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory., , , and . Secur. Commun. Networks, 9 (15): 2627-2640 (2016)