Author of the publication

Comparison Analysis of Web Usage Mining Using Pattern Recognition Techniques | Directory of Open Access Journals

, , and . International Journal of Data Mining & Knowledge Management Process, 3 (4): 137--147 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel authentication protocol for enabling secure communication in Internet of Things., and . Concurr. Comput. Pract. Exp., (2022)Gravitational search algorithm-driven missing links prediction in social networks., and . Concurr. Comput. Pract. Exp., (2022)Survey on Machine Learning and Deep Learning Applications in Breast Cancer Diagnosis., , and . Cogn. Comput., 13 (6): 1451-1470 (2021)An approach for predicting missing links in social network using node attribute and path information., and . Int. J. Syst. Assur. Eng. Manag., 13 (2): 944-956 (2022)SECSIX: security engine for CSRF, SQL injection and XSS attacks., , and . Int. J. Syst. Assur. Eng. Manag., 8 (2s): 631-644 (2017)Toward intelligent resource management in dynamic Fog Computing-based Internet of Things environment with Deep Reinforcement Learning: A survey., and . Int. J. Commun. Syst., (2023)A Survey on the Detection of SQL Injection Attacks and Their Countermeasures., , and . J. Inf. Process. Syst., 13 (4): 689-702 (2017)Analysis of Message Propagation for Intelligent Disaster Management through Vehicular Cloud Network., , , , and . ICTCS, page 46:1-46:5. (2016)Enhancing the performance of web proxy server through cluster based prefetching techniques., , and . ICACCI, page 1158-1165. IEEE, (2013)Comparison Analysis of Web Usage Mining Using Pattern Recognition Techniques | Directory of Open Access Journals, , and . International Journal of Data Mining & Knowledge Management Process, 3 (4): 137--147 (2013)