1
gan Mohamed Yassin, Warusia
Cyhoeddwyd 2015
... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...
Cael y testun llawn
Thesis
2
gan Mohamed Yassin, Warusia
Cyhoeddwyd 2015
... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...
Cael y testun llawn
Thesis
3
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System...
Cael y testun llawn
Electronig eLyfr
4
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...
Cael y testun llawn
Electronig eLyfr
5
Cyhoeddwyd 2012
Tabl Cynhwysion: ... Biclustering for Neural Information Processing -- Color Image Segmentation Based on Regional Saliency -- Mass...
Cael y testun llawn
Electronig eLyfr
6
Cyhoeddwyd 2012
Tabl Cynhwysion: ... Nonlinear Embedding -- SNEOM: A Sanger Network Based Extended Over-Sampling Method. Application...
Cael y testun llawn
Electronig eLyfr
7
Cyhoeddwyd 2013
Tabl Cynhwysion: ... Selection -- Information-Based Scale Saliency Methods with Wavelet Sub-band Energy Density Descriptors...
Cael y testun llawn
Electronig eLyfr
8
Cyhoeddwyd 2010
Tabl Cynhwysion: ... of Heterogeneous Geospatial Information -- Information Technology -- Dynamic Web Service Composition Based...
Cael y testun llawn
Electronig eLyfr
9
Cyhoeddwyd 2014
Tabl Cynhwysion: ... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...
Cael y testun llawn
Electronig eLyfr
10
Cyhoeddwyd 2014
Tabl Cynhwysion: ... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...
Cael y testun llawn
Electronig eLyfr
11
Cyhoeddwyd 2008
Tabl Cynhwysion: ... Approach for Mixed-Integer Linear Programs -- Simulation-Based Optimization for Steel Stacking -- Robust...
Cael y testun llawn
Electronig eLyfr
12
Cyhoeddwyd 2010
Tabl Cynhwysion: ... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...
Cael y testun llawn
Electronig eLyfr
13
Cyhoeddwyd 2012
Tabl Cynhwysion: ... -- HERO – A Home Based Routing in Pocket Switched Networks -- Routing for Information Leakage Reduction...
Cael y testun llawn
Electronig eLyfr
14
Cyhoeddwyd 2008
Tabl Cynhwysion: ... and Emergence in Self-Organizing Systems -- A Method to Derive Local Interaction Strategies for Improving...
Cael y testun llawn
Electronig eLyfr
15
Cyhoeddwyd 2008
Tabl Cynhwysion: ... Smoothness -- Kernel-Based Inductive Transfer -- State-Dependent Exploration for Policy Gradient Methods...
Cael y testun llawn
Electronig eLyfr
16
Cyhoeddwyd 2010
Tabl Cynhwysion: ... Classification -- A Bio-inspired Fusion Method for Data Visualization -- CBRid4SQL: A CBR Intrusion Detector...
Cael y testun llawn
Electronig eLyfr
17
Cyhoeddwyd 2010
Tabl Cynhwysion: ... Movies -- Fuzzy Reasoning Boolean Petri Nets Based Method for Modeling and Analysing Genetic Regulatory...
Cael y testun llawn
Electronig eLyfr
18
Cyhoeddwyd 2008
Tabl Cynhwysion: ... Functions on Non-equidistant Grids -- Intrusive versus Non-Intrusive Methods for Stochastic Finite Elements...
Cael y testun llawn
Electronig eLyfr
19
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Communication Systems -- Agent-Based Distributed Intrusion Alert System -- SCIDS: A Soft Computing Intrusion...
Cael y testun llawn
Electronig eLyfr
20
Cyhoeddwyd 2012
Tabl Cynhwysion: ... Information (SNI) with Gradient -- Design of Smart Home Control System Based on ZigBee and Embedded Web...
Cael y testun llawn
Electronig eLyfr