Author of the publication

Design and analysis of genetic fuzzy systems for intrusion detection in computer networks.

, , and . Expert Syst. Appl., 38 (6): 7067-7075 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Heterogeneous Agents in Dynamic Environments, a Case Study in RoboCupRescue., , , , and . MATES, volume 2831 of Lecture Notes in Computer Science, page 95-104. Springer, (2003)GMSCN: Generative Model Selection Using a Scalable and Size-Independent Complex Network Classifier., , and . CoRR, (2013)SharifII Soccer Simulation Team., , , , , and . RoboCup, volume 2019 of Lecture Notes in Computer Science, page 437-440. Springer, (2000)Application of Social Harmony Search Algorithm on Composite Web Service Selection Based on Quality Attributes., , and . ICGEC, page 526-529. IEEE, (2012)Topology awareness of overlay P2P networks., and . Concurr. Comput. Pract. Exp., 19 (7): 999-1021 (2007)Semantic web service composition testbed., , , and . Comput. Electr. Eng., 36 (5): 805-817 (2010)Semantic partitioning of peer-to-peer search space., , and . Comput. Commun., 32 (4): 619-633 (2009)Minimum linear arrangement of Chord graphs., and . Appl. Math. Comput., 203 (1): 358-367 (2008)A Comparison of Metric-Based and Empirical Approaches for Cognitive Analysis of Modeling Languages., and . Fundam. Informaticae, 90 (3): 337-352 (2009)On non-progressive spread of influence through social networks., , , , , and . Theor. Comput. Sci., (2014)