Author of the publication

An Approach based on Social Bees for an Intrusion Detection System by Scenario.

, , , and . IJOCI, 5 (3): 44-67 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving the max-cut problem using semidefinite optimization., and . CIST, page 768-772. IEEE, (2016)La Classification non Supervisée (Clustering) de Documents Textuels par les Automates Cellulaires., and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)An Approach based on Social Bees for an Intrusion Detection System by Scenario., , , and . IJOCI, 5 (3): 44-67 (2015)Coherent Route Cache In Dynamic Source Routing For Ad Hoc Networks., and . Comput. Sci. J. Moldova, 19 (3): 304-319 (2011)Annotation Sémantique De Pages Web., , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Interrogation Based on Semantic Annotations: Context-Based Construction of Formal Queries from Keywords., , and . Int. J. Web Portals, 9 (2): 47-67 (2017)Handwritten signatures recognition using Liquid State Machine., , and . Int. J. Biom., 3 (2): 148-158 (2011)Parallel corpora and WordSpace models: using a third language as an interlingua to enrich multilingual resources., , and . Int. J. Inf. Commun. Technol., 3 (4): 299-313 (2011)Interrogation à base d'Annotation Sémantique., , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)A proposed reasoning Algorithm using DLs in vectorial form., , and . IPAC, page 20:1-20:10. ACM, (2015)