From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ontologies to Lead Knowledge Intensive Evolutionary Algorithms: Principles and Case Study., , , и . IJKSS, 7 (1): 78-100 (2016)A Multi Objective Evolutionary Algorithm for Solving a Real Health Care Fleet Optimization Problem., , , и . KES, том 60 из Procedia Computer Science, стр. 256-265. Elsevier, (2015)Datasets are not enough: Challenges in labeling network traffic., , и . Comput. Secur., (2022)An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection., , и . Expert Syst. Appl., 39 (2): 1822-1829 (2012)DNS Tunneling: A Deep Learning based Lexicographical Detection Approach., , , , и . CoRR, (2020)Deep Convolutional Neural Networks for DGA Detection., , и . CACIC, том 995 из Communications in Computer and Information Science, стр. 327-340. Springer, (2018)Network traffic pattern recognition based on genetic algorithms., и . Inteligencia Artif., 12 (37): 65-75 (2008)Beyond Random Split for Assessing Statistical Model Performance., , , , и . CoRR, (2022)LLM in the Shell: Generative Honeypots., , , и . CoRR, (2023)Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments., , , и . ICAART (3), стр. 774-781. SCITEPRESS, (2024)