Author of the publication

INTRUSION DETECTION SYSTEM An Approach for Finding Attacks

, and . Science Park Research Journal, (April 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT Based LPG Cylinder Monitoring System., , , and . iSES, page 268-271. IEEE, (2019)Performance Enhancement of Gene Mention Tagging by Using Deep Learning and Biomedical Named Entity Recognition., and . FICTA (2), volume 1177 of Advances in Intelligent Systems and Computing, page 637-645. Springer, (2020)What You Say Is What You Show: Visual Narration Detection in Instructional Videos., , , and . CoRR, (2023)Non-malleable Secret Sharing for General Access Structures., and . CRYPTO (1), volume 10991 of Lecture Notes in Computer Science, page 501-530. Springer, (2018)NearBy-Offload: An Android based Application for Computation Offloading., , and . ICIIS, page 357-362. IEEE, (2020)Citywide reconstruction of traffic flow using the vehicle-mounted moving camera in the CARLA driving simulator., , , , and . ITSC, page 2292-2299. IEEE, (2022)Automated Security Audit Testbed For IP-Based IoT Devices Without Physical Access., , , , , and . IOTSMS, page 96-103. IEEE, (2023)Bandit algorithms: Letting go of logarithmic regret for statistical robustness., , , and . AISTATS, volume 130 of Proceedings of Machine Learning Research, page 622-630. PMLR, (2021)Striking a Balance: Alleviating Inconsistency in Pre-trained Models for Symmetric Classification Tasks., and . ACL (Findings), page 1887-1895. Association for Computational Linguistics, (2022)Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity., , , and . ICITS, volume 9063 of Lecture Notes in Computer Science, page 33-50. Springer, (2015)