Author of the publication

A Fuzzy Data Mining Based Intrusion Detection Model.

, , , and . FTDCS, page 191-197. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-path based Algorithms for Data Transfer in the Grid Environment., , , and . New Generation Comput., 28 (2): 129-136 (2010)PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures., , , and . Trustcom/BigDataSE/ISPA, page 683-690. IEEE, (2016)A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA Systems., , and . Trustcom/BigDataSE/ISPA, page 1145-1152. IEEE, (2016)Proportional Allocation of Resources on Shared Ring Buffer for Virtualization., , and . IJCAC, 2 (2): 12-30 (2012)Performance Effect Analysis of False Sharing Problem in Clusters with Single I/O Space., and . PDPTA, page 2788-2794. CSREA Press, (1999)Are a Few Neighboring Peers Good Enough?, , , , and . GLOBECOM, page 1-5. IEEE, (2010)Grid information service based on network latency., , , and . Infoscale, volume 152 of ACM International Conference Proceeding Series, page 9. ACM, (2006)ALTER: first step towards dependable grids., , and . SAC, page 805-806. ACM, (2006)FDKeeper: A Quick and Open Failure Detector for Cloud Computing System., , , and . C3S2E, page 14:1-14:8. ACM, (2014)BlockP2P: Enabling Fast Blockchain Broadcast with Scalable Peer-to-Peer Network Topology., , , , , , , and . GPC, volume 11484 of Lecture Notes in Computer Science, page 223-237. Springer, (2019)