Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML Rewriting Attacks: Existing Solutions and their Limitations, , and . CoRR, (2008)Approximation du score CFOF de détection d'anomalie dans un arbre d'indexation iSAX : Application au contexte SI de la SNCF., , , and . EGC, volume E-35 of RNTI, page 165-176. Éditions RNTI, (2019)Scoring Message Stream Anomalies in Railway Communication Systems., , , and . ICDM Workshops, page 769-776. IEEE, (2019)Combining Immune Systems and Social Insect Metaphors: A Paradigm for Distributed Intrusion Detection and Response System., , , and . MATA, volume 2881 of Lecture Notes in Computer Science, page 251-264. Springer, (2003)Comparison of Traffic Forecasting Methods in Urban and Suburban Context., , , , and . ICTAI, page 846-853. IEEE, (2018)A study of ACO capabilities for solving the maximum clique problem., and . J. Heuristics, 12 (3): 155-180 (2006)Header-Based Attacks.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Une méthode pour l'estimation désagrégée de données de population à l'aide de données ouvertes., , and . EGC, volume E-34 of RNTI, page 83-94. Éditions RNTI, (2018)A framework for evaluating urban land use mix from crowd-sourcing data., , , and . IEEE BigData, page 2147-2156. IEEE Computer Society, (2016)Convolutional Neural Networks for Disaggregated Population Mapping Using Open Data., , , and . DSAA, page 594-603. IEEE, (2018)