Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sandpiper: Scaling probabilistic inferencing to large scale graphical models., , , , , and . IEEE BigData, page 383-388. IEEE Computer Society, (2017)Monte Carlo Study of Taxonomy Evaluation., , , , and . DEXA Workshops, page 164-168. IEEE Computer Society, (2010)Extracting Hierarchies from Data Clusters for Better Classification., and . Algorithms, 5 (4): 506-520 (2012)Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 366-379. Springer, (2005)Simulation of Internet DDoS Attacks and Defense., and . ISC, volume 4176 of Lecture Notes in Computer Science, page 327-342. Springer, (2006)Enhancing Accuracy of Multilabel Classification by Extracting Hierarchies., , , , and . DEXA Workshops, page 203-207. IEEE Computer Society, (2011)Agent-based modeling and simulation of network softbots' competition., and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 243-252. IOS Press, (2006)Modeling Scalability of Distributed Machine Learning., , and . CoRR, (2016)Investigation of Cooperative Defense against DDoS., and . SECRYPT, page 180-183. INSTICC Press, (2007)Agent Teams in Cyberspace: Security Guards in the Global Internet., and . CW, page 133-140. IEEE Computer Society, (2006)