Author of the publication

Improvement of attack detection performance on the internet of things with PSO-search and random forest.

, , , , , , and . J. Comput. Sci., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method., , , , , , and . Int. J. Commun. Networks Inf. Secur., (2019)Improvement of attack detection performance on the internet of things with PSO-search and random forest., , , , , , and . J. Comput. Sci., (2022)Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm., , , , , and . Inf. Technol. Control., 50 (3): 495-506 (2021)Attack classification of an intrusion detection system using deep learning and hyperparameter optimization., , , and . J. Inf. Secur. Appl., (2021)Penetration Testing and Network Auditing: Linux., , and . J. Inf. Process. Syst., 11 (1): 104-115 (2015)Cyber-Attack Penetration Test and Vulnerability Analysis., , , , and . Int. J. Online Eng., 13 (1): 125-132 (2017)Investigating Brute Force Attack Patterns in IoT Network., , , , , and . J. Electr. Comput. Eng., (2019)An Approach for Optimizing Ensemble Intrusion Detection Systems., , , , , , , , , and . IEEE Access, (2021)Research on Heteregeneous Data for Recognizing Threat., , and . ICSOFT (1), page 222-225. SciTePress, (2011)Penetration Testing and Mitigation of Vulnerabilities Windows Server., , , , and . Int. J. Netw. Secur., 18 (3): 501-513 (2016)