Author of the publication

IoT Network Attack Detection using Supervised Machine Learning

, , and . International Journal of Artificial Intelligence and Expert Systems (IJAE), 10 (2): 18-32 (June 2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Derivative-based audio steganalysis., , and . ACM Trans. Multim. Comput. Commun. Appl., 7 (3): 18:1-18:19 (2011)An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics.. Pattern Recognit., (2017)A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data., , and . Bioinform., 28 (8): 1109-1113 (2012)Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images., and . ACM Trans. Intell. Syst. Technol., 5 (4): 63:1-63:30 (2014)Neighboring joint density-based JPEG steganalysis., , and . ACM Trans. Intell. Syst. Technol., 2 (2): 16:1-16:16 (2011)Mining the Big Data: The Critical Feature Dimension Problem., , , and . IIAI-AAI, page 499-504. IEEE Computer Society, (2014)Determine the Critical dimension in data mining (experiments with bioinformatics datasets)., , and . ISDA, page 481-486. IEEE, (2011)JPEG Compression Immune Steganography Using Wavelet Transform., , , and . ITCC (2), page 704-708. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Detection of Web-Attack using DistilBERT, RNN, and LSTM., , and . ISDFS, page 1-6. IEEE, (2023)Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography., , , and . ICPR (2), page 267-270. IEEE Computer Society, (2006)