Author of the publication

Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.

, , , , , and . ICCE-Taiwan, page 285-286. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design., , , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 63-80. Springer, (2015)Cross twisted Xate pairing with Barreto-Naehrig curve for multi-pairing technique., , , and . ISIT, page 2386-2390. IEEE, (2009)An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code., , , , , and . CANDAR Workshops, page 425-429. IEEE, (2019)Relations Between Evaluations of NIST Tests and Lyapunov Exponents of Sequences Generated by the Piecewise Logistic Map over Integers., , , , and . IWSDA, page 1-5. IEEE, (2019)Highly efficient GF(28) inversion circuit based on hybrid GF representations., , , and . J. Cryptographic Engineering, 9 (2): 101-113 (2019)A Geometric Sequence Binarized with Legendre Symbol over Odd Characteristic Field and Its Properties., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (12): 2336-2342 (2014)An Improvement of Scalar Multiplication by Skew Frobenius Map with Multi-Scalar Multiplication for KSS Curve., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1838-1845 (2017)Long Period Sequences Generated by the Logistic Map over Finite Fields with Control Parameter Four., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1816-1824 (2017)Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 182-189 (2009)Rounding Logistic Maps over Integers and the Properties of the Generated Sequences., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (9): 1817-1825 (2011)