Ali A. Ghorbani
Orcid: 0000-0001-9189-6268Affiliations:
- University of New Brunswick, Canada
According to our database1,
Ali A. Ghorbani
authored at least 288 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications.
Comput. Secur., 2025
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
IEEE Trans. Neural Networks Learn. Syst., September, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Comput. Soc. Syst., June, 2024
Int. J. Inf. Sec., April, 2024
IEEE Trans. Comput. Soc. Syst., February, 2024
IEEE Trans. Comput. Soc. Syst., February, 2024
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
Inf., February, 2024
IEEE Trans. Intell. Transp. Syst., January, 2024
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
IEEE Internet Things J., January, 2024
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective.
Comput. Commun., January, 2024
Knowl. Based Syst., 2024
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus.
Internet Things, 2024
Internet Things, 2024
Privacy-Preserving for Images in Satellite Communications: A Comprehensive Review of Chaos-Based Encryption.
CoRR, 2024
Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure.
CoRR, 2024
Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration.
CoRR, 2024
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks.
Comput. Secur., 2024
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure.
Comput. Secur., 2024
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Sensors, July, 2023
Internet Things, July, 2023
Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023
A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems.
Appl. Soft Comput., April, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
ACM Trans. Internet Things, 2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Sens. Actuator Networks, 2022
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder.
J. Netw. Syst. Manag., 2022
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022
An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022
Int. J. Inf. Comput. Secur., 2022
Int. J. Crit. Infrastructure Prot., 2022
Comput. Electr. Eng., 2022
IEEE Access, 2022
QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution.
IEEE Access, 2022
Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the ICMLT 2022: 7th International Conference on Machine Learning Technologies, Rome, Italy, March 11, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints.
Proceedings of the IEEE International Conference on Communications, 2022
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022
2021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021
IEEE Open J. Commun. Soc., 2021
On the causal relation between real world activities and emotional expressions of social media users.
J. Assoc. Inf. Sci. Technol., 2021
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021
Digit. Investig., 2021
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency.
CoRR, 2021
Classifying and clustering malicious advertisement uniform resource locators using deep learning.
Comput. Intell., 2021
Appl. Soft Comput., 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021
Proceedings of the Blockchain - ICBC 2021, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021
2020
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms.
Sensors, 2020
An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
Secur. Priv., 2020
Neural Comput. Appl., 2020
Inf. Process. Manag., 2020
IEEE Internet Things J., 2020
Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour.
Digit. Investig., 2020
Digit. Investig., 2020
Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
J. Cyber Secur. Mobil., 2019
The reflection of offline activities on users' online social behavior: An observational study.
Inf. Process. Manag., 2019
IET Commun., 2019
IACR Cryptol. ePrint Arch., 2019
IEEE Access, 2019
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Information Security Practice and Experience, 2019
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
On the causal relation between users' real-world activities and their affective processes.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges.
J. Cyber Secur. Mobil., 2018
J. Inf. Secur. Appl., 2018
Comput. Intell., 2018
IEEE Access, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
Proceedings of the International Conference on Computational Science, 2017
2016
J. Cyber Secur. Mobil., 2016
Int. J. Semantic Comput., 2016
Comput. Secur., 2016
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Int. J. Inf. Comput. Secur., 2015
Proceedings of the Third International Workshop on Linked Data for Information Extraction (LD4IE2015) co-located with the 14th International Semantic Web Conference (ISWC 2015), 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management.
J. Comput. Virol. Hacking Tech., 2014
J. Cyber Secur. Mobil., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Towards effective feature selection in machine learning-based botnet detection approaches.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Int. J. Netw. Secur., 2013
Comput. Secur., 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the Active Media Technology - 9th International Conference, 2013
Proceedings of the Advances in Artificial Intelligence, 2013
2012
IEEE Trans. Vis. Comput. Graph., 2012
Improved competitive learning neural networks for network intrusion and fraud detection.
Neurocomputing, 2012
Int. J. Bio Inspired Comput., 2012
Toward developing a systematic approach to generate benchmark datasets for intrusion detection.
Comput. Secur., 2012
Comput. Commun., 2012
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 2012 SC Companion: High Performance Computing, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Estimating botnet virulence within mathematical models of botnet propagation dynamics.
Comput. Secur., 2011
Comput. Commun., 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues.
Proceedings of the Brain Informatics - International Conference, 2011
2010
Advances in Information Security 47, Springer, ISBN: 978-0-387-88770-8, 2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games.
IEEE Trans. Syst. Man Cybern. Part A, 2010
The analysis and management of non-canonical requirement specifications through a belief integration game.
Knowl. Inf. Syst., 2010
Inf. Syst. Frontiers, 2010
An exploratory classification of applications in the realm of collaborative modeling and design.
Inf. Syst. E Bus. Manag., 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Hybrid Artificial Intelligence Systems, 5th International Conference, 2010
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Proceedings of the Advances in Artificial Intelligence, 2010
2009
IEEE Trans. Syst. Man Cybern. Part A, 2009
A belief-theoretic framework for the collaborative development and integration of para-consistent conceptual models.
J. Syst. Softw., 2009
Int. J. Inf. Technol. Web Eng., 2009
EURASIP J. Adv. Signal Process., 2009
Comput. Secur., 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering.
Proceedings of the Advances in Artificial Intelligence, 2009
2008
J. Comput. Secur., 2008
The state of the art in critical infrastructure protection: a framework for convergence.
Int. J. Crit. Infrastructures, 2008
An Interactive Search Assistant Architecture Based on Intrinsic Query Stream Characteristics.
Comput. Intell., 2008
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the MICAI 2008: Advances in Artificial Intelligence, 2008
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process.
Proceedings of the Software Architecture, Second European Conference, 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008
Proceedings of the Advances in Artificial Intelligence , 2008
Proceedings of the Advances in Artificial Intelligence , 2008
Proceedings of the Advances in Artificial Intelligence , 2008
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Int. J. Netw. Secur., 2007
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems.
Int. J. Inf. Sec., 2007
An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis.
Int. J. Bus. Process. Integr. Manag., 2007
Comput. Secur., 2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.
Proceedings of the Information Security, 10th International Conference, 2007
Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.
Proceedings of the Trust Management, 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
2006
A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines.
Proceedings of the Algorithms and Models for the Web-Graph, Fourth International Workshop, 2006
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Design and implementation of a behavioral difference analyzer for network intrusion detection.
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
CIFS: a Trust-Based Multilayer Information Filtering System for Multi-Agent Mobile Information Systems.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
2005
IEEE Trans. Neural Networks, 2005
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005
Category-based Similarity Algorithm for Semantic Similarity in Multi-agent Information Sharing Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005
Proceedings of the Computer Supported Cooperative Work in Design II, 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
Proceedings of the Advances in Artificial Intelligence, 2005
2004
Web Intell. Agent Syst., 2004
Comput. Intell., 2004
On the Evaluation of Adaptive Web Systems.
Proceedings of the 2nd International Workshop on Web-based Support Systems, 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004
Proceedings of the Advances in Artificial Intelligence, 2004
2003
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003
Using Fuzzy System to Manage False Alarms in Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003
Proceedings of the Advances in Artificial Intelligence, 2003
Proceedings of the Advances in Artificial Intelligence, 2003
2002
Comput. Intell., 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2001
Proceedings of the Advances in Artificial Intelligence, 2001
2000
Proceedings of the Mobile Agents for Telecommunication Applications, 2000
Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm.
Proceedings of the Advances in Artificial Intelligence, 2000
1998
IEEE Trans. Neural Networks, 1998
1996
Proceedings of International Conference on Neural Networks (ICNN'96), 1996
1995
IEEE Trans. Neural Networks, 1995