Author of the publication

Experimentation of Data Mining Technique for System's Security: A Comparative Study.

, , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 248-257. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Experiments with a Primal-Dual Algorithm for Solving Quadratic Problems., and . ICORES, page 204-209. SciTePress, (2016)Representation of textual documents by the approach wordnet and n-grams for the unsupervised classification (clustering) with 2D cellular automata: a comparative study., , , and . Computer and Information Science, 3 (3): 240-255 (2010)Solving the max-cut problem using semidefinite optimization., and . CIST, page 768-772. IEEE, (2016)La Classification non Supervisée (Clustering) de Documents Textuels par les Automates Cellulaires., and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)An Approach based on Social Bees for an Intrusion Detection System by Scenario., , , and . IJOCI, 5 (3): 44-67 (2015)Annotation Sémantique De Pages Web., , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Interrogation à base d'Annotation Sémantique., , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Handwritten signatures recognition using Liquid State Machine., , and . Int. J. Biom., 3 (2): 148-158 (2011)Parallel corpora and WordSpace models: using a third language as an interlingua to enrich multilingual resources., , and . Int. J. Inf. Commun. Technol., 3 (4): 299-313 (2011)A proposed reasoning Algorithm using DLs in vectorial form., , and . IPAC, page 20:1-20:10. ACM, (2015)