162 results on '"Jantan, Aman"'
Search Results
52. An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction
53. The effects of feature selection on the classification of encrypted botnet
54. Supplementary_Files – Supplemental material for HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
55. A comprehensive review of honey encryption scheme
56. HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
57. An Efficient Intrusion Detection Model Based on Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multilayer Perceptrons
58. A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel
59. A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm
60. Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization
61. Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication
62. Modified honey encryption scheme for encoding natural language message
63. A comprehensive review of honey encryption scheme
64. A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
65. Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
66. Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence.
67. Policy-Based Security Solution for Service-Oriented Software Engineering (SOSE)
68. An enhanced Bat algorithm with mutation operator for numerical optimization problems
69. A Novel Hybrid Artificial Bee Colony with Monarch Butterfly Optimization for Global Optimization Problems
70. Hybridizing Bat Algorithm with Modified Pitch-Adjustment Operator for Numerical Optimization Problems
71. Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems
72. NEW APPROACH TO IMPROVE ANOMALY DETECTION USING A NEURAL NETWORK OPTIMIZED BY HYBRID ABC AND PSO ALGORITHMS.
73. Swarm intelligence and neural network for data classification
74. Image Encrytion Using Block Based Transformation Algorithm
75. Towards a Privacy Diagnosis Centre : Measuring k-anonymity
76. Real-time detection of intrusive traffic in QoS network domains
77. E-Cyborg: The cybercrime evidence finder
78. A Framework For Dynamic Updating In Component-Based Software Systems.
79. Toward Pure Componentware
80. Protocol Based Interaction in Component-Based Software Systems.
81. Determining The Black-Box Component's Failure.
82. Dependencies Management in Dynamically Updateable Component-Based System.
83. Novel Multi-Objective Artificial Bee Colony Optimization for Wrapper Based Feature Selection in Intrusion Detection.
84. The Agent Pattern Driven Business Engineering (APBDE) approach enabled business-based systems
85. Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
86. Multi-Connect Architecture (MCA) Associative Memory: A Modified Hopfield Neural Network
87. Malware Behavior Analysis: Learning and Understanding Current Malware Threats
88. A Framework for Malware Detection Using Combination Technique and Signature Generation
89. Towards a Privacy Diagnosis Centre: Measuring k-Anonymity
90. Diversity versus anonymity for privacy preservation
91. Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors
92. Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation
93. Dependencies Management in Dynamically Updateable Component-Based Systems
94. E-Cyborg: The Cybercrime Evidence Finder.
95. A NEW APPROACH FOR RESOLVING CYBER CRIME IN NETWORK FORENSICS BASED ON GENERIC PROCESS MODEL.
96. MULTI-CONNECT ARCHITECTURE (MCA) ASSOCIATIVE MEMORY: A MODIFIED HOPFIELD NEURAL NETWORK.
97. Image Encryption Using Block-Based Transformation Algorithm.
98. Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
99. The Role of Artificial Neural Networks (ANNs) in Supporting Strategic Management Decisions.
100. Machine Learning-Based Causality Analysis of Human Resource Practices on Firm Performance.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.