Author of the publication

A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed) Denial of Service Attacks.

, , and . Inf. Technol. Control., 51 (1): 180-215 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Depthwise Separable Convolution Neural Network for Screening Covid-19 Infection from Chest CT and X-ray Images., , , , and . DCOSS, page 410-413. IEEE, (2022)Detection Offensive Tamil Texts using Machine Learning and Multilingual Transformers Models., , , , , and . FIRE (Working Notes), volume 3159 of CEUR Workshop Proceedings, page 720-728. CEUR-WS.org, (2021)Summary generation approaches based on semantic analysis for news documents., , and . J. Inf. Sci., 42 (4): 465-476 (2016)AI Powered COVID-19 Detection System using Non-Contact Sensing Technology and Deep Learning Techniques., , and . DCOSS, page 400-403. IEEE, (2022)Automated support thresholds for rule mining., , and . Int. J. Bus. Intell. Data Min., 11 (2): 151-170 (2016)The role of contemporary digital tools and technologies in COVID-19 crisis: An exploratory analysis., , , , , and . Expert Syst. J. Knowl. Eng., (2022)KEC@DPIL-FIRE2016: Detection of Paraphrases in Indian Languages (Tamil)., , , and . FIRE (Working Notes), volume 1737 of CEUR Workshop Proceedings, page 282-288. CEUR-WS.org, (2016)Low Storage and Traceback Overhead IP Traceback System., , and . J. Inf. Sci. Eng., 32 (1): 27-45 (2016)Performance Comparison of Different Convolutional Neural Network Models for the Detection of COVID-19., , and . ICHSA, volume 140 of Lecture Notes on Data Engineering and Communications Technologies, page 413-425. Springer, (2022)A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed) Denial of Service Attacks., , and . Inf. Technol. Control., 51 (1): 180-215 (2022)