Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 129-142. Springer, (2010)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks., , , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 294-308. Springer, (2011)Eye center localization and detection using radial mapping., , , , and . ICIP, page 3121-3125. IEEE, (2016)An Active Detection Mechanism for Detecting ICMP Based Attacks., , , , and . TrustCom, page 51-58. IEEE Computer Society, (2012)ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum., , , , and . ICIP, page 335-339. IEEE, (2016)A preliminary study of CNNs for iris and periocular verification in the visible spectrum., , , and . ICPR, page 181-186. IEEE, (2016)An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics., , and . CSS, volume 7672 of Lecture Notes in Computer Science, page 139-152. Springer, (2012)Aggression Identification in English, Hindi and Bangla Text using BERT, RoBERTa and SVM., , , and . TRAC@LREC, page 76-82. European Language Resources Association (ELRA), (2020)