Author of the publication

A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks.

, , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 280-293. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Unseen Features-Enriched Lifelong Machine Learning Framework., and . ICCSA (2), volume 13957 of Lecture Notes in Computer Science, page 471-481. Springer, (2023)A Multilayer Perceptron Architecture for Detecting Deceptive Cryptocurrencies in Coin Market Capitalization Data., and . WI, page 438-442. ACM, (2019)Identifying cliques in dark web forums - An agglomerative clustering approach., and . ISI, page 171-173. IEEE, (2012)Fuzzy ontologies for handling uncertainties and inconsistencies in domain knowledge description., and . FUZZ-IEEE, page 1366-1373. IEEE, (2008)Mining feature-opinion pairs and their reliability scores from web opinion sources., , and . WIMS, page 15:1-15:7. ACM, (2012)Relation Extraction from Texts for Efficient Access to InformationApplication to Bio-Medical Text Processing., , and . IICAI, page 1719-1737. IICAI, (2007)Compact Residual Learning with Frequency-Based Non-Square Kernels for Small Footprint Keyword Spotting., and . ICON, page 328-336. Association for Computational Linguistics, (2022)Identifying active, reactive, and inactive targets of socialbots in Twitter., and . WI, page 573-580. ACM, (2017)A Multi-Attributed Graph-Based Approach for Text Data Modeling and Event Detection in Twitter., , and . COMSNETS, page 703-708. IEEE, (2019)An Activity Pattern Based Wireless Intrusion Detection System., , and . ITNG, page 846-847. IEEE Computer Society, (2012)