Search results for: A. Nur Zincir-Heywood
International Journal of Network Management > 27 > 4 > n/a - n/a
2017 IEEE Security and Privacy Workshops (SPW) > 235 - 240
IEEE Systems Journal > 2016 > 10 > 4 > 1390 - 1401
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoCOMNET Contributions > 105-110
Lecture Notes in Computer Science > Genetic Programming > 802.11 De-authentication Attack Detection Using Genetic Programming > 1-12
Lecture Notes in Computer Science > Genetic and Evolutionary Computation — GECCO 2003 > Real World Applications > 2325-2336
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoCOMNET Contributions > 11-20
Lecture Notes in Computer Science > Knowledge-Based Intelligent Information and Engineering Systems > Applications of Machine Learning Concepts > 498-505
Lecture Notes in Control and Information Sciences > Intelligent Control and Automation > Data Fusion, Knowledge Discovery and Data Mining > 845-850
Advances in Intelligent and Soft Computing > Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’8 > Network Security > 203-210
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 93-100