Author of the publication

A New Approach for Detecting SMTPFA Based on Entropy Measurement.

, , , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 349-359. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Version Space Learning Algorithm for Noisy and Uncertain Data., and . IEEE Trans. Knowl. Data Eng., 9 (2): 336-340 (1997)Developing an AR-Based Ubiquitous Learning System for a Smart Campus., , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 404-414. Springer, (2020)Automatically integrating multiple rule sets in a distributed-knowledge environment., , , and . IEEE Trans. Syst. Man Cybern. Part C, 28 (3): 471-476 (1998)Discovering the Radio Signal Coverage Hole and Weak Coverage Area in Mobile Network by Spatiotemporal Data Mining on Location-Based Services., , , and . Fundam. Informaticae, 98 (1): 33-47 (2010)A Parallel Perceptron Learning Algorithm., and . ICPP (3), page 288-289. CRC Press, (1991)Learning Sequences Construction Using Ontology and Rules., , , , and . ICCE, volume 133 of Frontiers in Artificial Intelligence and Applications, page 865-870. IOS Press, (2005)A Framework of High Confidence E-Healthcare Information System., , , , and . ICWI, page 493-500. IADIS, (2003)Constructing Scorm Compliant Course Based on High Level Petri Nets., , , and . CELDA, page 204-216. IADIS, (2004)Detecting Intrusion Patterns Using Bit-Wise Indexing Method., , and . ISAS-SCI (1), page 35-39. IIIS, (2001)Constructing detection knowledge for DDoS intrusion tolerance., and . Expert Syst. Appl., 27 (3): 379-390 (2004)