Author of the publication

MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique.

, , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integral and Impossible Differential Cryptanalysis of RC6., , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 606-616. Springer, (2018)Ensuring replication-based data integrity and availability in multicloud storage., , , and . SNPD, page 687-692. IEEE Computer Society, (2016)Text Content Filtering Based on Chinese Character Reconstruction from Radicals., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 234-240. Springer, (2010)A network traffic-aware mobile application recommendation system based on network traffic cost consideration., , , and . Int. J. Comput. Sci. Eng., 19 (2): 259-273 (2019)MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique., , , , , and . IEEE Access, (2019)Predicting the semantic orientation of movie reviews., , , and . FSKD, page 2483-2488. IEEE, (2010)An Android App Recommendation Approach by Merging Network Traffic Cost., , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 326-338. Springer, (2017)Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 101-112. Springer, (2018)Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud., , , , and . Trustcom/BigDataSE/ISPA, page 737-743. IEEE, (2016)De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining., , , , , and . KSII Trans. Internet Inf. Syst., 11 (6): 3230-3253 (2017)