检索结果筛选:

全文
出版年度
学科主题
作者
来源出版物
出版社
收录数据库
语种
国别/地区

文章检索列表

22 条结果, 检索条件:( ( *(AU:("Issa Traore")) ) )

排序: 导出:
[期刊论文]

Unsupervised anomaly detection using an evolutionary extension of k-means algorithm

作者:Wei Lu ;Issa Traore

来源:International Journal of Information and Computer Security. 2008 ;2(2):107.doi:10.1504/IJICS.2008.018513

出版社:Inderscience Publishers

全文购买

[期刊论文]

Profiling distributed connection chains

作者:Ahmad Almulhem ;Issa Traore

来源:International Journal of Communication Networks and Distributed Systems. 2008 ;1(1):4.doi:10.1504/IJCNDS.2008.017201

出版社:Inderscience Publishers

全文购买

[期刊论文]

Converting Declarative Rules into Decision Trees

作者:Amany Abdelhalim ;Issa Traore

来源:Lecture Notes in Engineering and Computer Science. 2009 ;2178(1):206-212.

出版社:Newswood and International Association of Engineers

开放获取

[期刊论文]

Detecting New Forms of Network Intrusion Using Genetic Programming

作者:Wei Lu ;Issa Traore

来源:Computational Intelligence. 2004 ;20(3):475-494.doi:10.1111/j.0824-7935.2004.00247.x

出版社:John Wiley & Sons, Ltd.

全文购买

[期刊论文]

Detecting opinion spams and fake news using text classification

作者:Hadeer Ahmed ;Issa Traore ;Sherif Saad

来源:Security and Privacy. 2018 ;1(1):e9.doi:10.1002/spy2.9

出版社:John Wiley & Sons, Ltd.

全文购买

[期刊论文]

State of the art and perspectives on traditional and emerging biometrics: A survey

作者:Issa Traore ;Mohammed Alshahrani ;Mohammad S. Obaidat

来源:Security and Privacy. 2018 ;1(6):e44.doi:10.1002/spy2.44

出版社:John Wiley & Sons, Ltd.

全文购买

[期刊论文]

Annotated Control Flow Graph for Metamorphic Malware Detection

作者:Shahid Alam ;Issa Traore ;Ibrahim Sogukpinar

来源:The Computer Journal. 2015 ;58(10):2608-2621.doi:10.1093/comjnl/bxu148

出版社:Oxford University Press (OUP)

全文购买

[期刊论文]

Specifying a model of semantic web service composition

作者:Souleymane OUMTANAGA ;Issa TRAORE ;Michel BABRI

来源:International Journal on Computer Science and Engineering. 2011 ;3(10):3393-3402.

出版社:Engg Journals Publications

开放获取

[期刊论文]

SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place

作者:Achyuth Nandikotkur ;Issa Traore ;Mohammad Mamun

来源:Sensors. 2023 ;23(15):6752.doi:10.3390/s23156752

出版社:MDPI AG

开放获取

[期刊论文]

Creating Decision Trees from Rules using RBDT‐1

作者:Youssef Nakkabi ;Issa Traore ;Amany Abdelhalim

来源:Computational Intelligence. 2016 ;32(2):216-239.doi:10.1111/coin.12049

出版社:John Wiley & Sons, Ltd.

全文购买