Author of the publication

A General Framework for Adaptive Anomaly Detection with Evolving Connectionist Systems.

, , and . SDM, page 437-441. SIAM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Approaches for Cost-Effective Traffic Grooming in WDM Ring Networks: Non-Uniform Traffic and Bidirectional Ring., , , and . ICC (3), page 1295-1299. IEEE, (2000)Software Agents for Computer Games., and . GAME-ON, page 56-. ?, (2000)Analysis of Speciation and Niching in the Multi-Niche Crowding GA., and . Theor. Comput. Sci., 229 (1): 177-197 (1999)Information filtering via hill climbing, wordnet, and index patterns., and . Inf. Process. Manag., 33 (5): 633-644 (1997)An artificial immune system approach to document clustering., and . SAC, page 918-922. ACM, (2005)A Web-knowledge-based Clustering Model for Gene Expression Data Analysis., and . Advances in Web Intelligence and Data Mining, volume 23 of Studies in Computational Intelligence, Springer, (2006)Effect of Image Activity on Lossy and Lossless Coding Performance., and . Data Compression Conference, page 570. IEEE Computer Society, (2000)Robust Support Vector Machines for Anomaly Detection in Computer Security., , and . ICMLA, page 168-174. CSREA Press, (2003)Micro Genetic Algorithms in Finding the Optimal Frequency for Stabilizing Atoms by High-intensity Laser Fields, , and . Late Breaking Papers at the Genetic Programming 1998 Conference, University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Machine Learning in Infrastructure Security.. IICAI, page 1-3. IICAI, (2003)