224 results on '"Ghorbani, Ali"'
Search Results
2. Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024
3. Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment
4. Percutaneous Osteotomy of the Hallux Proximal Phalanx
5. Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack
6. A Detailed Analysis of the CICIDS2017 Data Set
7. Generating Phishing Emails Using Graph Database
8. DNA-Droid: A Real-Time Android Ransomware Detection Framework
9. An Entropy Based Encrypted Traffic Classifier
10. Detecting Malicious URLs Using Lexical Analysis
11. Alert Management and Correlation
12. Intrusion Response
13. Evaluation Criteria
14. Theoretical Foundation of Detection
15. Detection Approaches
16. Architecture and Implementation
17. Data Collection
18. Network Attacks
19. DroidKin: Lightweight Detection of Android Apps Similarity
20. A Multi-agent System for Smartphone Intrusion Detection Framework
21. Android Botnets: What URLs are Telling Us
22. Classifying Organizational Roles Using Email Social Networks
23. Lexical-Syntactical Patterns for Subjectivity Analysis of Social Issues
24. Peer to Peer Botnet Detection Based on Flow Intervals
25. Group Behavior Metrics for P2P Botnet Detection
26. Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation
27. Selective Regular Expression Matching
28. IDS Alert Visualization and Monitoring through Heuristic Host Selection
29. An Online Adaptive Approach to Alert Correlation
30. Y-Means: An Autonomous Clustering Algorithm
31. Automatic Discovery of Network Applications: A Hybrid Approach
32. A Framework for the Manifestation of Tacit Critical Infrastructure Knowledge
33. An Iterative Hybrid Filter-Wrapper Approach to Feature Selection for Document Clustering
34. A Frequency Mining-Based Algorithm for Re-ranking Web Search Engine Retrievals
35. A Belief-Theoretic Reputation Estimation Model for Multi-context Communities
36. A Novel Approach for Social Behavior Analysis of the Blogosphere
37. On the Definition of Essential and Contingent Properties of Subjective Belief Bases
38. Automating Architecture Trade-Off Decision Making through a Complex Multi-attribute Decision Process
39. A Phrase Recommendation Algorithm Based on Query Stream Mining in Web Search Engines
40. Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications
41. A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection
42. Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems
43. Using Web Services to Control Remote Instruments for Online Experiment Systems
44. SWAMI: Searching the Web Using Agents with Mobility and Intelligence
45. SVision: A Network Host-Centered Anomaly Visualization Technique
46. The Reconstruction of the Interleaved Sessions from a Server Log
47. Using Fuzzy System to Manage False Alarms in Intrusion Detection
48. A Performance Evaluation of the Acorn Architecture
49. The Bottom-Up Freezing: An Approach to Neural Engineering
50. Accelerated Backpropagation Learning: Extended Dynamic Parallel Tangent Optimization Algorithm
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.