Author of the publication

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.

, , and . HPCC/EUC, page 175-182. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing email classification using data reduction and disagreement-based semi-supervised learning., , and . ICC, page 622-627. IEEE, (2014)The practice on using machine learning for network anomaly intrusion detection.. ICMLC, page 576-581. IEEE, (2011)Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 203-221. Springer, (2012)Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 483-497. Springer, (2012)Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions., and . ISNN (2), volume 7952 of Lecture Notes in Computer Science, page 622-629. Springer, (2013)Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges., , and . CIS, page 518-522. IEEE Computer Society, (2013)Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme., and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 349-356. Springer, (2012)Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection., , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 40-53. Springer, (2013)Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection., and . Int. J. Comput. Intell. Syst., 6 (4): 626-638 (2013)Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones., , and . SAC, page 1680-1687. ACM, (2014)