Author of the publication

A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances in the enumeration of foldable self-avoiding walks., , , and . Int. J. Comput. Sci. Eng., 22 (4): 365-375 (2020)Critique on Natural Noise in Recommender Systems., , , and . ACM Trans. Knowl. Discov. Data, 15 (5): 75:1-75:30 (2021)Performance of low level protocols in high traffic wireless body sensor networks., , , , and . Peer-to-Peer Netw. Appl., 13 (3): 850-871 (2020)Cultivating Inclusivity: A Journey Towards Democratizing Cybersecurity Education., , , and . TALE, page 1-4. IEEE, (2023)Adaptive Serendipity for Recommender Systems: Let It Find You., , , and . ICAART (2), page 739-745. SciTePress, (2019)Modeling the Invisible Internet., and . COMPLEX NETWORKS (3), volume 1143 of Studies in Computational Intelligence, page 359-370. Springer, (2023)Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks., , , and . CoRR, (2022)2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques., and . IEEE Access, (2024)An optimal cluster-based routing algorithm for UCBSNs., , , , and . Internet Technol. Lett., (2021)