Author of the publication

Intrusion Detection Markup Language (IDML) and IDML Based Intrusion Detection Model.

, , and . ISAS-SCI (1), page 56-61. IIIS, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and implementation of new object-oriented rule base management system., , and . Expert Syst. Appl., 25 (3): 369-385 (2003)Ontology-Based Knowledge Fusion Framework Using Graph Partitioning., , and . IEA/AIE, volume 2718 of Lecture Notes in Computer Science, page 11-20. Springer, (2003)An Intrusion Detection Model Based Upon Intrusion Detection Markup Language., , and . J. Inf. Sci. Eng., 17 (6): 899-919 (2001)10.3 heterogeneous multi-processing quad-core CPU and dual-GPU design for optimal performance, power, and thermal tradeoffs in a 28nm mobile application processor., , , , , , , , , and 18 other author(s). ISSCC, page 180-181. IEEE, (2014)7.1 A 3.4-to-13.3TOPS/W 3.6TOPS Dual-Core Deep-Learning Accelerator for Versatile AI Applications in 7nm 5G Smartphone SoC., , , , , , , , , and 6 other author(s). ISSCC, page 134-136. IEEE, (2020)A New Mechanism of Mining Network Behavior., , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 218-223. Springer, (2002)20.1 NVE: A 3nm 23.2TOPS/W 12b-Digital-CIM-Based Neural Engine for High-Resolution Visual-Quality Enhancement on Smart Devices., , , , , , , , , and 14 other author(s). ISSCC, page 360-362. IEEE, (2024)Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory., , , , and . ICEA, page 11:1-11:3. ACM, (2020)Intrusion Detection Markup Language (IDML) and IDML Based Intrusion Detection Model., , and . ISAS-SCI (1), page 56-61. IIIS, (2001)The Design and Implementation of a Computer-Assisted Learning Expert System., , and . Int. J. Comput. Proc. Oriental Lang., 15 (1): 33-61 (2002)