Author of the publication

A Consensus Based Network Intrusion Detection System.

, , and . ICITCS, page 1-6. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A three-phase matheuristic for capacitated multi-commodity fixed-cost network design with design-balance constraints., , and . J. Heuristics, 19 (5): 757-795 (2013)Global optimization properties of parallel cooperative search algorithms: A simulation study., , and . Parallel Comput., 26 (1): 91-112 (2000)CLAP: an object-oriented programming system for distributed memory parallel machines., , , , , and . OOPS Messenger, 5 (1): 44-48 (1994)Automatic Quantum Computer Programming: A Genetic Programming Approach.. Genet. Program. Evolvable Mach., 7 (1): 125-126 (2006)Parallel Strategies for Meta-Heuristics., and . Handbook of Metaheuristics, volume 57 of International Series in Operations Research & Management Science, Kluwer / Springer, (2003)Lower-Bound Study for Function Computation in Distributed Networks via Vertex-Eccentricity., and . SN Comput. Sci., 1 (1): 10:1-10:14 (2020)Scheduled service network design with resource acquisition and management., , , and . EURO J. Transp. Logist., 7 (3): 277-309 (2018)Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System., , , and . Informatica (Slovenia), (2017)Message from the Program Chairs and Industry Panel Chairs., , , , and . ACOMP, page ix. IEEE, (2020)Protecting Consensus Seeking NIDS Modules against Multiple Attackers., and . SoICT, page 226-233. ACM, (2017)