Author of the publication

Detecting Web-Based Attacks: A Comparative Analysis of Machine Learning and BERT Transformer Approaches.

, , , , and . IEA/AIE (2), volume 13926 of Lecture Notes in Computer Science, page 325-332. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting injection profiles using ANFIS., , , , , and . Inf. Sci., 177 (20): 4445-4461 (2007)Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning., , , and . BIOSIGNALS, page 396-401. INSTICC Press, (2009)Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data., , , and . ICAISC, volume 4029 of Lecture Notes in Computer Science, page 951-961. Springer, (2006)Model evaluation of datasets using critical dimension model invariants., , , and . ISDA, page 740-745. IEEE, (2012)Exposing seam carving forgery under recompression attacks by hybrid large feature mining.. ICPR, page 1041-1046. IEEE, (2016)Spectrum Steganalysis of WAV Audio Streams., , and . MLDM, volume 5632 of Lecture Notes in Computer Science, page 582-593. Springer, (2009)A JPEG-based statistically invisible steganography., , , and . ICIMCS, page 78-81. ACM, (2011)Merging Permission and API Features for Android Malware Detection., , and . IIAI-AAI, page 566-571. IEEE Computer Society, (2016)Detecting Digital Photo Tampering with Deep Learning., and . MLICOM, volume 251 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 480-489. Springer, (2018)Sampling and Evaluating the Big Data for Knowledge Discovery., , and . IoTBD, page 378-382. SciTePress, (2016)