From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Outlier detection in the concept drifting environment., , и . IJCNN, стр. 31-37. IEEE, (2016)Exploring the online underground marketplaces through topic-based social network and clustering., и . ISI, стр. 145-150. IEEE, (2016)Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting., , и . Ind. Manag. Data Syst., 112 (2): 224-244 (2012)The prediction approach with Growing Hierarchical Self-Organizing Map., и . IJCNN, стр. 1-7. IEEE, (2012)Enhancing Mathematics Learning Outcomes through a Flipped Classroom Grouping Mechanism Informed by Self-study Habits: Utilizing iPad Screen Time Data., , , , и . ICITL, том 14099 из Lecture Notes in Computer Science, стр. 295-303. Springer, (2023)Identifying the socio-spatial dynamics of terrorist attacks in the Middle East., , , и . ISI, стр. 175-180. IEEE, (2016)Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis., и . TrustCom, стр. 1771-1776. IEEE, (2020)Event Pattern Discovery on IDS Traces of Cloud Services., , и . BDCloud, стр. 25-32. IEEE Computer Society, (2014)The rule-extraction through the preimage analysis., , и . IJCNN, стр. 1488-1494. IEEE, (2008)Ziffersystem: A novel malware distribution detection system., , , , и . DSC, стр. 509-515. IEEE, (2017)