Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packaged and hybrid integrated all-optical flip-flop memory, , , , , , , , , and . Electronics Letters, 42 (24): 1399--1400 (2006)An Overview of Computational Intelligence Techniques in Intrusion Detection Systems.. Neural Networks and Computational Intelligence, page 102-107. IASTED/ACTA Press, (2003)AutoCorrel: a neural network event correlation approach., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 62410N. SPIE, (2006)Clustering using an Autoassociator: A Case Study in Network Event Correlation., , and . IASTED PDCS, page 613-618. IASTED/ACTA Press, (2005)Standardization and Integration of Gynecologic Data for Translational Research., , , , , , , , and . AMIA, AMIA, (2013)Image sensing with multilayer, nonlinear optical neural networks., , , , , , , and . CoRR, (2022)DW4TR: A Data Warehouse for Translational Research., , , , , , , , , and 7 other author(s). J. Biomed. Informatics, 44 (6): 1004-1019 (2011)Identifier mapping performance for integrating transcriptomics and proteomics experimental results., , , , , , , , , and . BMC Bioinform., (2011)A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach.. SEC, volume 278 of IFIP, page 525-540. Springer, (2008)Cyber Security Decision Support for Remediation in Automated Computer Network Defence.. ATCS/SePrIoT@SecureComm, volume 239 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 198-217. Springer, (2017)