32 results on '"Kalita, J. K."'
Search Results
2. Cost Effective Method for Ransomware Detection: An Ensemble Approach
3. Survey on Incremental Approaches for Network Anomaly Detection
4. Cost Effective Method for Ransomware Detection: An Ensemble Approach
5. BicBioEC: biclustering in biomarker identification for ESCC
6. Packet and Flow Based Network Intrusion Dataset
7. RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets
8. DDoS Attacks
9. XSSD: A Cross-site Scripting Attack Dataset and its Evaluation
10. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
11. Denial of Service Attack Detection using Multivariate Correlation Analysis
12. Denial of Service Attack Detection using Multivariate Correlation Analysis.
13. Information metrics for low-rate DDoS attack detection: A comparative evaluation
14. Network Anomaly Detection: Methods, Systems and Tools
15. Summarization of Twitter Microblogs
16. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
17. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
18. An effective unsupervised network anomaly detection method
19. Intersected coexpressed subcube miner: An effective triclustering algorithm
20. Surveying Port Scans and Their Detection Methodologies
21. A Survey of Outlier Detection Methods in Network Anomaly Identification
22. NADO
23. An effective unsupervised network anomaly detection method.
24. NADO.
25. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
26. CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol.
27. Situation assessment and prediction in intelligence domains
28. A Novel Algorithm for Local Alignment of Protein Interaction Networks: MODULA
29. A response to the need for summary responses
30. Detecting protein complexes based on a combination of topological and biological properties in protein-protein interaction network.
31. An effective graph-based clustering technique to identify coherent patterns from gene expression data.
32. Computational modelling and simulation of the immune system.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.