Author of the publication

Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems.

, , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 706-714. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Verification of Belief Programs., and . CoRR, (2022)Research on Ordinal Properties in Combinatorics Coding Method., , and . J. Comput., 6 (1): 51-58 (2011)Projection in a probabilistic epistemic logic and its application to belief-based program verification.. RWTH Aachen University, Germany, (2023)A Bio-inspired Multidimensional Network Security Model., , , and . IMSCCS (2), page 3-7. IEEE Computer Society, (2006)0-7695-2581-4.Design and Implementation of a Workflow-Based Message-Oriented Middleware., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 842-845. Springer, (2006)A New Automatic Intrusion Response Taxonomy and Its Application., , , , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 999-1003. Springer, (2006)A novel robotic grasping method for moving objects based on multi-agent deep reinforcement learning., , , , , and . Robotics Comput. Integr. Manuf., (April 2024)On the progression of belief., and . Artif. Intell., (September 2023)Fast Algorithms for Semantic Association Search and Pattern Mining., , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1490-1502 (2021)Fast and Practical Snippet Generation for RDF Datasets., , , and . ACM Trans. Web, 13 (4): 19:1-19:38 (2019)