Author of the publication

Remodeling and Simulation of Intrusion Detection Evaluation Dataset.

, , and . Security and Management, page 245-251. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review: Quantifier Scope, by Susumu Kuno and Ken-ichi Takami.. Prague Bull. Math. Linguistics, (2004)Logic BIST Architecture for System-Level Test and Diagnosis., , , , , , , , , and 5 other author(s). Asian Test Symposium, page 21-26. IEEE Computer Society, (2009)Geographic Location-Based Service Reliability Prediction., and . CBD, page 267-274. IEEE Computer Society, (2014)Optimal input design for parameter estimation of nonlinear systems: case study of an unstable delta wing., , and . Int. J. Control, 90 (4): 873-887 (2017)Data Fusion Based Interference Matrix Generation for Cellular System Frequency Planning, , , , and . CoRR, (2010)Hybrid Hierarchical and Modular Tests for SoC Designs., , , , , , , and . NATW, page 11-16. IEEE, (2015)Data fusion-based interference matrix generation for cellular system frequency planning., , , , and . Int. J. Communication Systems, 24 (11): 1506-1519 (2011)Review: Linguistic Historiography: Projects and Prospects, by E. F. Konrad Koerner.. Prague Bull. Math. Linguistics, (2000)Review: Sketches of Slavic Scholars, by Henrik Birnbaum.. Prague Bull. Math. Linguistics, (2000)Towards A History of Linguistic IdeasA Note on Jan Firbas and the Prague School.. Prague Bull. Math. Linguistics, (2001)