Author of the publication

Intrusion Classifier based on Multiple Attribute Selection Algorithms.

, , , , and . J. Comput., 8 (10): 2536-2543 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme., , , , and . J. Networks, 6 (11): 1557-1564 (2011)The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage., , , , , and . J. Commun., 10 (10): 766-772 (2015)The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment., , , , , and . KSII Trans. Internet Inf. Syst., 6 (1): 131-146 (2012)An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering., , , and . J. Networks, 8 (3): 672-679 (2013)Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network., , and . CSP, page 153-160. IEEE, (2021)A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment., , and . Symmetry, 12 (1): 150 (2020)A Survey on Green Computing Based on Cloud Environment., , , , and . Int. J. Online Eng., 9 (3): 27-33 (2013)The efficiency improved scheme for secure access control of digital video distribution., , , , and . Multim. Tools Appl., 75 (20): 12645-12662 (2016)An Improved Dynamic Password based Group Key Agreement against Dictionary Attack., , , , and . J. Softw., 7 (7): 1524-1530 (2012)Analysis and Enhancement of Three Identity-based Signcryption Protocols., , , , and . J. Comput., 7 (4): 1006-1013 (2012)