142 results on '"Jantan, Aman"'
Search Results
2. Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review
3. Retrieval of Information Through Botnet Attacks
4. The effects of feature selection on the classification of encrypted botnet
5. Formal knowledge model for online social network forensics
6. A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm
7. Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp
8. A multilayered semantic framework for integrated forensic acquisition on social media
9. Evidence collection and forensics on social networks: Research challenges and directions
10. The Age of Ransomware
11. Hybridizing Bat Algorithm with Modified Pitch Adjustment Operator for Numerical Optimization Problems
12. A Novel Hybrid Artificial Bee Colony with Monarch Butterfly Optimization for Global Optimization Problems
13. State-of-the-art in artificial neural network applications: A survey
14. Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization
15. Ransomware Evolution: Solving Ransomware Attack Challenges
16. An enhanced Bat algorithm with mutation operator for numerical optimization problems
17. A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons
18. Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems
19. Filtration model for the detection of malicious traffic in large-scale networks
20. The Age of Ransomware
21. Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches.
22. A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics
23. A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm
24. F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics
25. Attack Intention Analysis Model for Network Forensics
26. A Secure Storage Model to Preserve Evidence in Network Forensics
27. A Framework for Optimizing Malware Classification by Using Genetic Algorithm
28. A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring
29. Privacy Risk Diagnosis: Mining l-Diversity
30. Clustering-Based Frequency l-Diversity Anonymization
31. Honeybee-Based Model to Detect Intrusion
32. An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction
33. Hybridizing Bat Algorithm with Modified Pitch Adjustment Operator for Numerical Optimization Problems
34. A Novel Hybrid Artificial Bee Colony with Monarch Butterfly Optimization for Global Optimization Problems
35. Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review.
36. A New Algorithm to Estimate the Similarity between the Intentions of the Cyber Crimes for Network Forensics
37. A MACHINE LEARNING CLASSIFICATION APPROACH TO DETECT TLS-BASED MALWARE USING ENTROPY-BASED FLOW SET FEATURES
38. A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
39. SLA-based complementary approach for network intrusion detection
40. Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
41. Multi-Behavior RFM Model Based on Improved SOM Neural Network Algorithm for Customer Segmentation
42. Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
43. A Framework for Optimizing Malware Classification by Using Genetic Algorithm
44. A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm
45. A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring
46. A Secure Storage Model to Preserve Evidence in Network Forensics
47. Attack Intention Analysis Model for Network Forensics
48. F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics
49. Privacy Risk Diagnosis: Mining l-Diversity
50. Clustering-Based Frequency l-Diversity Anonymization
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.