Author of the publication

Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction.

, , , , , , and . J. Big Data, 11 (1): 33 (December 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges., , , and . Internet Things, (2022)Rapid health data repository allocation using predictive machine learning., , , and . Health Informatics J., 26 (4): 3009-3036 (2020)An Efficient Selective Miner Consensus Protocol in Blockchain Oriented IoT Smart Monitoring., , , and . ICIT, page 1135-1142. IEEE, (2019)A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring., , , and . WiMob, page 1-8. IEEE, (2019)usfAD Based Effective Unknown Attack Detection Focused IDS Framework., , , , and . CoRR, (2024)Empowering COVID-19 Detection: Optimizing Performance Through Fine-Tuned EfficientNet Deep Learning Architecture., , , , and . CoRR, (2023)Exploring Gene Regulatory Interaction Networks and predicting therapeutic molecules for Hypopharyngeal Cancer and EGFR-mutated lung adenocarcinoma., , , , , , , , , and . CoRR, (2024)A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats., , , , and . CoRR, (2024)Noise aware level based routing protocol for underwater sensor networks., , , and . IWCI, page 169-174. IEEE, (2016)A Dependable Hybrid Machine Learning Model for Network Intrusion Detection., , , , , , , and . CoRR, (2022)