Author of the publication

A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm.

, , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4262-4272 (December 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of Muscle Activity and Ultrasound Response of Lower Extremity Muscles During Treadmill and Track Running., , , and . J. Medical Imaging Health Informatics, 11 (8): 2091-2096 (2021)A Review of Provenance Graph based APT Attack Detection: Applications and Developments., , , , , and . DSC, page 498-505. IEEE, (2022)Building framework for selecting finite element models of complex large welded structure of railway vehicles., , , , , and . Simul. Model. Pract. Theory, (2019)Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks., , , , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 446-453. Springer, (2019)A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match., , , , and . DSC, page 480-486. IEEE, (2019)Answer Quality Assessment in CQA Based on Similar Support Sets., , , , and . CCL, volume 9427 of Lecture Notes in Computer Science, page 309-325. Springer, (2015)An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment, , , and . CoRR, (2013)A MapReduce and Information Compression Based Social Community Structure Mining Method., , , , , and . CSE, page 971-980. IEEE Computer Society, (2013)A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN., , , , and . DSC, page 156-161. IEEE Computer Society, (2017)Identity-Based Blind Proxy Re-Signature Scheme for Data Security., , , , , and . DSC, page 28-32. IEEE, (2018)