|
Search the dblp DataBase
Wanli Ma:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mehmet A. Orgun, Wanli Ma
An Overview of Temporal and Modal Logic Programming. [Citation Graph (0, 0)][DBLP] ICTL, 1994, pp:445-479 [Conf]
- Wanli Ma, C. W. Johnson, Richard P. Brent
Programming with transactions and chemical abstract machine. [Citation Graph (0, 0)][DBLP] ISPAN, 1996, pp:562-564 [Conf]
- Wanli Ma, Dharmendra Sharma
A Multiple Agents Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:205-211 [Conf]
- Wanli Ma, Dat Tran, Dharmendra Sharma, Abhishek Mathur
Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1176-1183 [Conf]
- Dharmendra Sharma, Wanli Ma, Dat Tran
On an IT Security Framework. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:226-232 [Conf]
- Dharmendra Sharma, Wanli Ma, Dat Tran, Mary Anderson
A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1184-1191 [Conf]
- Kang Zhang, Wanli Ma
Graphical Assistance in Parallel Program Development. [Citation Graph (0, 0)][DBLP] VL, 1994, pp:168-170 [Conf]
- Wanli Ma, Dat Tran, Dharmendra Sharma
Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP] KES (2), 2007, pp:589-596 [Conf]
- Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP] KES (2), 2007, pp:547-554 [Conf]
Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP]
On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP]
Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP]
A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP]
Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP]
Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP]
Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP]
Detecting Image Based Spam Email. [Citation Graph (, )][DBLP]
A Multi-agent Security Architecture. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|