Author of the publication

A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection.

, , , and . Concurr. Comput. Pract. Exp., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card., , and . IEEE Access, (2019)Effectiveness of the Use of Golden Ratio in Identifying Similar Faces Using Ensemble Learning., , , and . ATIS, volume 1554 of Communications in Computer and Information Science, page 62-80. Springer, (2021)A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems., , , , and . SSCC, volume 969 of Communications in Computer and Information Science, page 578-590. Springer, (2018)A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection., , , and . Concurr. Comput. Pract. Exp., (2023)2D-3D Facial Image Analysis for Identification of Facial Features Using Machine Learning Algorithms With Hyper-Parameter Optimization for Forensics Applications., , , , and . IEEE Access, (2023)Enhanced Authentication and Key Agreement Mechanism Using PKI., , , , and . ATIS, volume 950 of Communications in Computer and Information Science, page 40-51. Springer, (2018)Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list., , , , and . Inf. Secur. J. A Glob. Perspect., 27 (4): 214-229 (2018)Detection of Malpractice in E-exams by Head Pose and Gaze Estimation., , , and . Int. J. Emerg. Technol. Learn., (2021)Analysis of Classification Algorithms for Predicting Parkinson's Disease and Applications in the Field of Cybersecurity., , , and . ATIS, volume 1804 of Communications in Computer and Information Science, page 155-163. Springer, (2022)Intrusion Detection Using Federated Learning., , and . ATIS, volume 1804 of Communications in Computer and Information Science, page 143-151. Springer, (2022)