Author of the publication

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning.

, , , , and . Trans. Emerg. Telecommun. Technol., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment., , , and . J. Parallel Distributed Comput., (2020)Human activity recognition based on an amalgamation of CEV & SGM features., , , and . J. Intell. Fuzzy Syst., 43 (6): 7351-7362 (2022)Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks., , , , and . Comput. Commun., (September 2023)Cortex-inspired ensemble based network intrusion detection system., , , and . Neural Comput. Appl., 35 (21): 15415-15428 (July 2023)Efficient Non-Linear Covert Channel Detection in TCP Data Streams., , , , and . IEEE Access, (2020)Intelligent intrusion detection system in smart grid using computational intelligence and machine learning., , , , and . Trans. Emerg. Telecommun. Technol., (2021)Detecting Intrusions in Federated Cloud Environments Using Security as a Service., , and . DeSE, page 91-96. IEEE, (2015)Robust spatial fuzzy GMM based MRI segmentation and carotid artery plaque detection in ultrasound images., , , , and . Comput. Methods Programs Biomed., (2019)A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions., , , , , and . IEEE Access, (2022)Revocable, Decentralized Multi-Authority Access Control System., , , and . UCC Companion, page 220-225. IEEE, (2018)