Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Network Intrusion Detection. (2018)Data Analytics on Eco-Conditional Factors Affecting Speech Recognition Rate of Modern Interaction Systems., , , , , and . J. Mobile Multimedia, 18 (4): 1153-1176 (2022)C SVM Classification and KNN Techniques for Cyber Crime Detection., , , , and . Wirel. Commun. Mob. Comput., (2022)Identification of Cyber Criminal by Analysing the Users Profile., and . Int. J. Netw. Secur., 20 (4): 738-745 (2018)Implementing file and real time based intrusion detections in secure direct method using advanced honeypot., and . Clust. Comput., 22 (6): 13361-13368 (2019)A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization., and . SNDS, volume 420 of Communications in Computer and Information Science, page 160-171. Springer, (2014)Evaluation of an automated phenotyping algorithm for rheumatoid arthritis., , , , , , , , , and . J. Biomed. Informatics, (2022)Performance Evaluation of Joint Rate-Distortion Model of Video Codec., and . CSOC (1), volume 1224 of Advances in Intelligent Systems and Computing, page 63-72. Springer, (2020)A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 52-62. Springer, (2013)Clustering of web users' access patterns using a modified competitive agglomerative algorithm., and . ICACCI, page 701-707. IEEE, (2017)