Author of the publication

Host-Based Intrusion Detection Using Statistical Approaches.

, and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 481-493. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion detection in RFID system using computational intelligence approach for underground mines., and . Int. J. Commun. Syst., (2018)Double-Sided LC with LCC Anti-Resonant Tank-Based WPT System for Wide Output Voltage Range., , and . IECON, page 1-6. IEEE, (2023)Host-Based Intrusion Detection Using Statistical Approaches., and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 481-493. Springer, (2015)Correlation between Shatchakra and Kundalini in Context of Yogic Science. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (5): 651-656 (July 2022)