Author of the publication

Progress of Machine Learning in the Field of Intrusion Detection Systems

, and . International Journal on Cryptography and Information Security (IJCIS), 11 (2/3): 14 (September 2021)
DOI: https://doi.org/10.5121/ijcis.2021.11401

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Leghris, Cherkaoui
add a person with the name Leghris, Cherkaoui
 

Other publications of authors with the same name

New Network Selection Algorithm Based on Cosine Similarity Distance and PSO in Heterogeneous Wireless Networks., and . J. Comput. Networks Commun., (2021)New Manhattan distance-based fuzzy MADM method for the network selection., and . IET Commun., 13 (13): 1980-1987 (2019)A Comparison Between MADM Methods and Utility Functions in the Network Selection Context., and . MSPN, volume 11557 of Lecture Notes in Computer Science, page 201-210. Springer, (2019)The use of MADM methods in the vertical handover decision making context., and . WINCOM, page 1-6. IEEE, (2017)Contribution to Optimization and Evaluation of IPv6 Signals Based Constrained Devices Networks., and . Wirel. Pers. Commun., 117 (3): 2311-2325 (2021)Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks., and . Secur. Commun. Networks, (2018)Study of the SNORT intrusion detection system based on machine learning., and . CiSt, page 33-37. IEEE, (2023)New multi access selection method using differentiated weight of access interface., , and . ICCIT, page 237-242. IEEE, (2012)Using Fuzzy Gray Relational Analysis in the Vertical Handover Process in Wireless Networks., and . NETYS, volume 10299 of Lecture Notes in Computer Science, page 396-401. (2017)Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks., and . IET Networks, 7 (4): 226-232 (2018)