Applied Computational Intelligence
GICAP


Universidad de Salamanca
Salamanca, España
2025
-
Preface
Lecture Notes in Networks and Systems
-
Preface
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Preface
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2024
-
Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families
Logic Journal of the IGPL, Vol. 32, Núm. 2, pp. 306-320
-
Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach
Mathematics, Vol. 12, Núm. 2
-
Early numerical skills and mathematical domains in autistic students in primary school
Frontiers in Psychiatry, Vol. 15
-
Preface
Lecture Notes in Networks and Systems
-
Preface
Lecture Notes in Networks and Systems
-
Soft-Computing Techniques to Address Industrial and Environmental Challenges
Cybernetics and Systems, Vol. 55, Núm. 6, pp. 1311-1313
2023
-
A Comparison of Monte Carlo-Based and PINN Parameter Estimation Methods for Malware Identification in IoT Networks
Technologies, Vol. 11, Núm. 5
-
Benchmarking Classifiers for DDoS Attack Detection in Industrial IoT Networks
Lecture Notes in Networks and Systems
-
Finding and Removing Infected T-Trees in IoT Networks
Lecture Notes in Networks and Systems
-
Innovative Soft-Computing Solutions for Industrial and Environmental Problems
Cybernetics and Systems
-
Preface
Lecture Notes in Networks and Systems
-
Preface
Lecture Notes in Networks and Systems
-
Preface
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Preface
Lecture Notes in Networks and Systems
-
Preface
Lecture Notes in Networks and Systems
-
Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery
Lecture Notes in Networks and Systems
2022
-
A computational propagation model for malware based on the SIR classic model
Neurocomputing, Vol. 484, pp. 161-171