Author of the publication

Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation.

, , and . IAS, page 679-682. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation., , and . IAS, page 679-682. IEEE Computer Society, (2009)A Survey on Privacy Preserving Data Mining Approaches and Techniques., , and . ICSCA, page 65-69. ACM, (2019)Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey., , , , , and . IRICT, volume 72 of Lecture Notes on Data Engineering and Communications Technologies, page 659-675. Springer, (2020)Handwritten alphabets recognition using twelve directional feature extraction and self organizing maps., , and . IC3INA, page 149-153. IEEE, (2014)Towards metamodel-based approach for Information Security Awareness Management., , and . ISBAST, page 316-321. IEEE, (2014)An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review., , , , , and . IRICT (2), volume 211 of Lecture Notes on, page 224-239. Springer, (2023)Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing., , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 748-758. Springer, (2019)HAC: Model for Privacy-Preserving Outsourced Data Over Cloud., , and . CRC, page 1-4. IEEE, (2021)A taxonomy on intrusion alert aggregation techniques., , , and . ISBAST, page 244-249. IEEE, (2014)