Author of the publication

Performance Evaluation of a Neural Network Based Intrusion Detection System for Tor Networks Considering different Hidden Units.

, , , , and . NBiS, page 620-627. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Neural Network Based User Identification for Tor Networks: Comparison Analysis of Activation Function Using Friedman Test., , , , , and . CISIS, page 477-483. IEEE Computer Society, (2016)A Neural Network Based Intrusion Detection and User Identification System for Tor Networks: Performance Evaluation for Different Number of Hidden Units using Friedman Test., , , , , and . J. Mobile Multimedia, 11 (3&4): 251-262 (2015)Implementation and Experimental Results of a Raspberry Pi and OLSR Based Wireless Content-Centric Network Testbed., , , , , and . BWCCA, page 263-268. IEEE Computer Society, (2015)Experimental Results of a Raspberry Pi Based WMN Testbed for Multiple Flows and Distributed Concurrent Processing., , , , , and . BWCCA, page 201-206. IEEE Computer Society, (2015)A Neural Network Based User Identification for Tor Networks: Data Analysis Using Friedman Test., , and . AINA Workshops, page 7-13. IEEE Computer Society, (2016)Performance Evaluation of a Neural Network Based Intrusion Detection System for Tor Networks Considering different Hidden Units., , , , and . NBiS, page 620-627. IEEE Computer Society, (2015)Application of Neural Networks and Friedman Test for User Identification in Tor Networks., , and . BWCCA, page 448-454. IEEE Computer Society, (2015)Application of Neural Networks for Intrusion Detection in Tor Networks., , , , , and . AINA Workshops, page 67-72. IEEE Computer Society, (2015)Application of Deep Recurrent Neural Networks for Prediction of User Behavior in Tor Networks., , , and . AINA Workshops, page 238-243. IEEE Computer Society, (2017)