From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data., и . J. Big Data, 7 (1): 104 (2020)Exploring filter-based feature selection techniques for software quality classification., , и . Int. J. Inf. Decis. Sci., 4 (2/3): 217-250 (2012)Using Classification Trees for Software Quality Models: Lessons Learned., , , , и . Int. J. Softw. Eng. Knowl. Eng., 9 (2): 217-231 (1999)Uncertain Classification of Fault-Prone Software Modules., , , , и . Empirical Software Engineering, 7 (4): 295-295 (2002)An Empirical Study of the Classification Performance of Learners on Imbalanced and Noisy Software Quality Data., , , и . IRI, стр. 651-658. IEEE Systems, Man, and Cybernetics Society, (2007)Incomplete-Case Nearest Neighbor Imputation in Software Measurement Data., и . IRI, стр. 630-637. IEEE Systems, Man, and Cybernetics Society, (2007)Which Software Modules have Faults which will be Discovered by Customers?, , , и . Journal of Software Maintenance, 11 (1): 1-18 (1999)Intrusion detection in wireless networks using clustering techniques with expert analysis., , , и . ICMLA, IEEE Computer Society, (2005)Feature Popularity Between Different Web Attacks with Supervised Feature Selection Rankers., , и . ICMLA, стр. 30-37. IEEE, (2021)Software quality analysis by combining multiple projects and learners., , и . Softw. Qual. J., 17 (1): 25-49 (2009)