Author of the publication

An Improved Method to Detect Intrusion Using Machine Learning Algorithms

, and . Informatics Engineering, an International Journal (IEIJ), 4 (2): 17 - 29 (June 2016)
DOI: 10.5121/ieij.2016.4203

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role of gender, self-efficacy, anxiety and testing formats in learning spreadsheets., , , and . Comput. Hum. Behav., 29 (3): 739-746 (2013)Feature Extraction Techniques with Analysis of Confusing Words for Speech Recognition in the Hindi Language., , and . Wirel. Pers. Commun., 118 (4): 3303-3333 (2021)SIM Application Toolkit - Protocol Conformance and Implementation Challenges., and . ICWMC, page 47. IEEE Computer Society, (2006)SPOSDS: A smart Polycystic Ovary Syndrome diagnostic system using machine learning., , , , , , , , and . Expert Syst. Appl., (October 2022)An Efficient Network Intrusion Detection Based on Decision Tree Classifier and Simple K-Mean Clustering using Dimensionality Reduction � A Review, and . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2): 789--791 (February 2015)An Agent Based Model for Exploring Internet Hacking Trend., , and . AMCIS, page 231. Association for Information Systems, (2009)An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions., and . Int. J. Comput. Commun. Control, 14 (6): 670-690 (2019)An Improved Method to Detect Intrusion Using Machine Learning Algorithms, and . Informatics Engineering, an International Journal (IEIJ), 4 (2): 17 - 29 (June 2019)A novel defense scheme against DDOS attack in VANET., , and . WOCN, page 1-5. IEEE, (2013)Hindi Speech Vowel Recognition Using Hidden Markov Model., , and . SLTU, page 201-204. ISCA, (2018)