Author of the publication

Selection of intrusion detection system threshold bounds for effective sensor fusion.

, and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657007. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced sensor fusion technique for enhanced Intrusion Detection., and . ISI, page 173-178. IEEE, (2008)Improved PSO for optimizing the performance of intrusion detection systems., and . J. Intell. Fuzzy Syst., 38 (5): 6537-6547 (2020)XAI for intrusion detection system: comparing explanations based on global and local scope., , , , and . J. Comput. Virol. Hacking Tech., 19 (2): 217-239 (June 2023)Brain tumor detection in MRI images using Adaptive-ANFIS classifier with segmentation of tumor and edema., , and . Soft Comput., 27 (5): 2279-2297 (March 2023)Game theoretical analysis of usable security and privacy., , and . Secur. Priv., (2021)Selection of intrusion detection system threshold bounds for effective sensor fusion., and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657007. SPIE, (2007)A Survey on Metamorphic Malware Detection based on Hidden Markov Model., and . ICACCI, page 357-362. IEEE, (2018)ProDroid - An Android malware detection framework based on profile hidden Markov model., and . Pervasive Mob. Comput., (2021)Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm., and . J. Parallel Distributed Comput., (2021)Machine Learning-Based Restart Policy for CDCL SAT Solvers., , , , , and . SAT, volume 10929 of Lecture Notes in Computer Science, page 94-110. Springer, (2018)