Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection., , , , , , , and . Future Gener. Comput. Syst., (2021)Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions., , and . Comput. Secur., (2018)Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network., , , , , and . Remote. Sens., 11 (23): 2852 (2019)An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications., , and . Appl. Soft Comput., 13 (4): 1978-1996 (2013)A novel intrusion detection framework for Wireless Sensor Networks., , and . IAS, page 350-353. IEEE, (2011)Malay Word Stemmer to Stem Standard and Slang Word Patterns on Social Media., , , and . DMBD, volume 9714 of Lecture Notes in Computer Science, page 391-400. Springer, (2016)A Comparative Statistical Analysis of Pseudorandom Bit Sequences., and . IAS, page 91-94. IEEE Computer Society, (2009)Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation., , and . IAS, page 679-682. IEEE Computer Society, (2009)A New Clustering Method Based on Weighted Kernel K-Means for Non-linear Data., , and . SoCPaR, page 19-24. IEEE Computer Society, (2009)Fraud detection system: A survey., , and . J. Netw. Comput. Appl., (2016)