Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling, analysis and containment of passive worms in P2P networks., , , , and . IJIPT, 8 (2/3): 130-142 (2014)Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning., , , and . JCP, 9 (7): 1542-1546 (2014)The Design of Serial ATA Bus Control Chip., , , and . JCP, 5 (4): 524-532 (2010)A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method., and . ICYCS, page 3057-3061. IEEE Computer Society, (2008)Anticipatory Runway Incursion Prevention Systems., , , and . IEICE Transactions, 96-D (11): 2385-2396 (2013)Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering., , and . CD-ARES, volume 8708 of Lecture Notes in Computer Science, page 270-280. Springer, (2014)Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification., , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 299-307. Springer, (2013)A new approach to generalized chaos synchronization based on the stability of the error system., , and . Kybernetika, 44 (4): 492-500 (2008)Downscaling of Surface Soil Moisture Retrieval by Combining MODIS/Landsat and In Situ Measurements., , , , , , and . Remote Sensing, 10 (2): 210 (2018)Long-Term Land Cover Dynamics (1986-2016) of Northeast China Derived from a Multi-Temporal Landsat Archive., , , , , , , , , and . Remote Sensing, 11 (5): 599 (2019)