Author of the publication

idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining.

, , , , , and . Inf. Sci., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Innovations in nature inspired optimization and learning methods., and . Neurocomputing, (2014)Soft computing models to analyze atmospheric pollution issues., , and . Log. J. IGPL, 20 (4): 699-711 (2012)Editorial: Special issue CISIS12-IGPL., , , , , and . Log. J. IGPL, 23 (1): 1-3 (2015)Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning., , , , , , , and . Log. J. IGPL, 30 (6): 1056-1073 (2022)MOVIH-IDS: A mobile-visualization hybrid intrusion detection system., , , and . Neurocomputing, 72 (13-15): 2775-2784 (2009)Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems., , , , , and . Neurocomputing, (2019)Computational intelligence applied to cybersecurity., , , , and . Expert Syst. J. Knowl. Eng., (2022)Optimizing the operating conditions in a high precision industrial process using soft computing techniques., , , and . Expert Syst. J. Knowl. Eng., 29 (3): 276-299 (2012)A Beta-Cooperative CBR System for Constructing a Business Management Model., , , and . ICDM, volume 3275 of Lecture Notes in Computer Science, page 42-49. Springer, (2004)A Soft Computing System to Perform Face Milling Operations., , , , , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 1282-1291. Springer, (2009)