From post

Prediction of Relevance between Requests and Web Services Using ANN and LR Models.

, , и . ACIIDS (2), том 7803 из Lecture Notes in Computer Science, стр. 40-49. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Intrusion Detection trust management through integrity and expertise evaluation., , и . CyberSec, стр. 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , и . CyberSec, стр. 139-143. IEEE, (2012)Novel Attack Detection Using Fuzzy Logic and Data Mining., и . Security and Management, стр. 26-31. CSREA Press, (2006)A New Decentralized Certification Verification Privacy Control Protocol., , и . CRC, стр. 1-6. IEEE, (2021)Implementing a Document-based Requirements Traceability: A Case Study., , , и . IASTED Conf. on Software Engineering, стр. 124-131. IASTED/ACTA Press, (2005)CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism., , и . Int. J. Commun. Networks Inf. Secur., (2017)Integrating Software Traceability for Change Impact Analysis., , , и . Int. Arab J. Inf. Technol., 2 (4): 301-308 (2005)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , и . APSEC, стр. 558-. IEEE Computer Society, (2002)Integration of Secrecy Features in a Federated Database Environment., , и . DBSec, том A-47 из IFIP Transactions, стр. 89-108. North-Holland, (1993)Security risk assessment framework for cloud computing environments., , , , и . Secur. Commun. Networks, 7 (11): 2114-2124 (2014)