Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Phase Transition of Finding a Biclique in a larger Bipartite Graph., , and . CoRR, (2016)An Approach Based on Contrast Patterns for Bot Detection on Web Log Files., , , , and . MICAI (1), volume 11288 of Lecture Notes in Computer Science, page 276-285. Springer, (2018)FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness., , , , and . IEEE Trans. Affect. Comput., 9 (3): 372-382 (2018)On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks., , , and . Sensors, 15 (4): 7619-7649 (2015)Editorial.. Computación y Sistemas, (2012)A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities., , , , and . ACM Comput. Surv., 54 (1): 18:1-18:38 (2022)COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems., , , and . Swarm Evol. Comput., (2021)Evader surveillance under incomplete information., , and . ICRA, page 5511-5518. IEEE, (2010)DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks., , , , , and . IEEE Access, (2019)Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample.. MICAI (1), volume 6437 of Lecture Notes in Computer Science, page 1-12. Springer, (2010)