Author of the publication

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree.

, , , , , , and . J. Cloud Comput., 12 (1): 137 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A smart waste classification model using hybrid CNN-LSTM with transfer learning for sustainable environment., , , and . Multim. Tools Appl., 83 (10): 29505-29529 (March 2024)Corrigendum to Ä novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205., , , , , , , and . Comput. Electr. Eng., (2022)Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree., , , , , , and . J. Cloud Comput., 12 (1): 137 (December 2023)Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model., , , , , , and . Array, (September 2023)An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering., , , , , , , , , and . Sensors, 23 (18): 7816 (September 2023)ProRE: An ACO- based programmer recommendation model to precisely manage software bugs., , , , , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (1): 483-498 (January 2023)A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks., , , , , , and . Int. J. Distributed Sens. Networks, 18 (9): 155013292211171 (2022)A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method., , , , , , , and . Sensors, 22 (16): 5986 (2022)Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain., , , , , , and . IEEE Access, (2023)Optimized LightGBM model for security and privacy issues in cyber-physical systems., , , , , , , , and . Trans. Emerg. Telecommun. Technol., (June 2023)