Author of the publication

A hybrid fraud scoring and spike detection technique in streaming data.

, and . Intell. Data Anal., 14 (6): 773-800 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets., and . Future Gener. Comput. Syst., 26 (8): 1141-1150 (2010)Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR., and . Soft Comput., 20 (1): 399-421 (2016)A high-performance and scalable multi-core aware software solution for network monitoring., and . J. Supercomput., 59 (2): 720-743 (2012)An Extension for Combination of Duty Constraints in Role-Based Access Control, and . CoRR, (2010)Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining., , and . CoRR, (2016)PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description., , and . Petri Nets, volume 5606 of Lecture Notes in Computer Science, page 343-352. Springer, (2009)Differential privacy preserving clustering using Daubechies-2 wavelet transform., and . Int. J. Wavelets Multiresolution Inf. Process., 13 (4): 1550028:1-1550028:35 (2015)Model checking the observational determinism security property using PROMELA and SPIN., and . Formal Aspects Comput., 27 (5-6): 789-804 (2015)A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology., and . Peer-to-Peer Netw. Appl., 8 (6): 1008-1022 (2015)Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques., and . Inf. Comput., (2015)