Author of the publication

IoT Network Attack Detection using Supervised Machine Learning

, , and . International Journal of Artificial Intelligence and Expert Systems (IJAE), 10 (2): 18-32 (June 2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics.. Pattern Recognit., (2017)Derivative-based audio steganalysis., , and . ACM Trans. Multim. Comput. Commun. Appl., 7 (3): 18:1-18:19 (2011)Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images., and . ACM Trans. Intell. Syst. Technol., 5 (4): 63:1-63:30 (2014)Neighboring joint density-based JPEG steganalysis., , and . ACM Trans. Intell. Syst. Technol., 2 (2): 16:1-16:16 (2011)A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data., , and . Bioinform., 28 (8): 1109-1113 (2012)Determine the Critical dimension in data mining (experiments with bioinformatics datasets)., , and . ISDA, page 481-486. IEEE, (2011)JPEG Compression Immune Steganography Using Wavelet Transform., , , and . ITCC (2), page 704-708. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Detection of Web-Attack using DistilBERT, RNN, and LSTM., , and . ISDFS, page 1-6. IEEE, (2023)Mining the Big Data: The Critical Feature Dimension Problem., , , and . IIAI-AAI, page 499-504. IEEE Computer Society, (2014)Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures., , , , and . SMC, page 5094-5099. IEEE, (2006)