Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , and . IEEE Access, (2020)Detecting mobile botnets through machine learning and system calls analysis., , , , and . ICC, page 1-6. IEEE, (2017)Toward Text Data Augmentation for Sentiment Analysis., , and . IEEE Trans. Artif. Intell., 3 (5): 657-668 (2022)A Meta-Learning Approach for Recommendation of Image Segmentation Algorithms., , and . SIBGRAPI, page 370-377. IEEE Computer Society, (2016)Recognition of Compromised Accounts on Twitter., , , and . SBSI, page 9-14. ACM, (2015)On the use of online clustering for anomaly detection in trace streams., , , and . SBSI, page 43:1-43:8. ACM, (2021)Account classification in online social networks with LBCA and wavelets., , , , , , and . Inf. Sci., (2016)Trace encoding in process mining: A survey and benchmarking., , , and . Eng. Appl. Artif. Intell., 126 (Part D): 107028 (November 2023)Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic., , , and . ISCC, page 1-6. IEEE Computer Society, (2014)Color energy as a seed descriptor for image segmentation with region growing algorithms on skin wound images., , , , , and . Healthcom, page 387-392. IEEE, (2014)