Found: 52
Select item for more details and to access through your institution.
A hybrid machine learning method for increasing the performance of network intrusion detection systems.
- Published in:
- Journal of Big Data, 2021, v. 8, n. 1, p. 1, doi. 10.1186/s40537-021-00531-w
- By:
- Publication type:
- Article
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 5, p. 487, doi. 10.1002/sec.225
- By:
- Publication type:
- Article
A Scheme Based on Convolutional Neural Network and Fuzzy Logic to Identify the Location of Possible Secret Data in a Digital Image.
- Published in:
- International Journal on Engineering Applications, 2024, v. 12, n. 1, p. 1, doi. 10.15866/irea.v12i1.23475
- By:
- Publication type:
- Article
Audio Data Hiding Based on Sample Value Modification Using Modulus Function.
- Published in:
- Journal of Information Processing Systems, 2016, v. 12, n. 3, p. 525, doi. 10.3745/JIPS.03.0054
- By:
- Publication type:
- Article
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 10, p. 4176, doi. 10.3837/tiis.2020.10.014
- By:
- Publication type:
- Article
Improving the Capability of Reduced Difference Expansion based Digital Image Data Hiding.
- Published in:
- IAENG International Journal of Computer Science, 2019, v. 46, n. 4, p. 1
- By:
- Publication type:
- Article
Improving Prediction Error Expansion based Data Hiding Method for Securing Confidential Data.
- Published in:
- IAENG International Journal of Computer Science, 2018, v. 45, n. 4, p. 32
- By:
- Publication type:
- Article
Hybrid Association Rule Learning and Process Mining for Fraud Detection.
- Published in:
- IAENG International Journal of Computer Science, 2015, v. 42, n. 2, p. 59
- By:
- Publication type:
- Article
Exploring the tree algorithms to generate the optimal detection system of students' stress levels.
- Published in:
- Indonesian Journal of Electrical Engineering & Computer Science, 2024, v. 36, n. 1, p. 548, doi. 10.11591/ijeecs.v36.i1.pp548-558
- By:
- Publication type:
- Article
Detecting Hidden Data in Images Using Convolutional Neural Networks.
- Published in:
- Mathematical Modelling of Engineering Problems, 2024, v. 11, n. 5, p. 1227, doi. 10.18280/mmep.110511
- By:
- Publication type:
- Article
Enhancing Data Hiding Methods for Improved Cyber Security Through Histogram Shifting Direction Optimization.
- Published in:
- Mathematical Modelling of Engineering Problems, 2023, v. 10, n. 5, p. 1508, doi. 10.18280/mmep.100502
- By:
- Publication type:
- Article
Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2022, v. 14, n. 2, p. 185, doi. 10.15849/IJASCA.220720.13
- By:
- Publication type:
- Article
Reversible Data Hiding Scheme based on General Difference Expansion Cluster.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2020, v. 12, n. 3, p. 11
- By:
- Publication type:
- Article
Reversible data hiding with segmented secrets and smoothed samples in various audio genres.
- Published in:
- Journal of Big Data, 2020, v. 7, n. 1, p. N.PAG, doi. 10.1186/s40537-020-00360-3
- By:
- Publication type:
- Article
Fuzzy MADM Approach for Rating of Process-Based Fraud.
- Published in:
- Journal of ICT Research & Applications, 2015, v. 9, n. 2, p. 111, doi. 10.5614/itbj.ict.res.appl.2015.9.2.1
- By:
- Publication type:
- Article
Optimizing Multi-Class Botnet Detection Models to Detect SPAM Botnets with Feature Selection Methods: A Comparative Analysis.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 4, p. 1339, doi. 10.18280/ijsse.140430
- By:
- Publication type:
- Article
Android Malware Classification Using Gain Ratio and Ensembled Machine Learning.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 1, p. 259, doi. 10.18280/ijsse.140126
- By:
- Publication type:
- Article
Enhancing the Capability of Data Hiding Method Based on Reduced Difference Expansion.
- Published in:
- Engineering Letters, 2018, v. 26, n. 1, p. 45
- By:
- Publication type:
- Article
Medical Record Protection with Improved GRDE Data Hiding Method on Audio Files.
- Published in:
- Engineering Letters, 2017, v. 25, n. 2, p. 9
- By:
- Publication type:
- Article
FORENSIC ANALYSIS OF DRONE COLLISION WITH TRANSFER LEARNING.
- Published in:
- Jordanian Journal of Computers & Information Technology, 2023, v. 9, n. 2, p. 175
- By:
- Publication type:
- Article
A convolutional neural network to detect possible hidden data in spatial domain images.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00156-x
- By:
- Publication type:
- Article
Reversible data hiding based on histogram and prediction error for sharing secret data.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00147-y
- By:
- Publication type:
- Article
Improving Prediction Error Expansion with Regression Using Mirror Embedding for Reversible ECG Steganography.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 4, p. 1146, doi. 10.22266/ijies2024.0831.85
- By:
- Publication type:
- Article
Data Hiding Approach to Enhance the Audio Sample Spaces Using Interpolation and Multi-layering.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 4, p. 352, doi. 10.22266/ijies2024.0831.27
- By:
- Publication type:
- Article
A New Approach of Botnet Activity Detection Models Using Combination of Univariate and ANOVA Feature Selection Techniques.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 3, p. 485, doi. 10.22266/ijies2024.0630.38
- By:
- Publication type:
- Article
Optimizing Feature Selection Method in Intrusion Detection System Using Thresholding.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 3, p. 214, doi. 10.22266/ijies2024.0630.18
- By:
- Publication type:
- Article
Analysis of Weight-Based Voting Classifier for Intrusion Detection System.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 2, p. 190, doi. 10.22266/ijies2024.0430.17
- By:
- Publication type:
- Article
Botnet Attack Analysis through Graph Visualization.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 1, p. 913, doi. 10.22266/ijies2024.0229.75
- By:
- Publication type:
- Article
Pixel-block-based Steganalysis Method for Hidden Data Location in Digital Images.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 6, p. 375, doi. 10.22266/ijies2023.1231.31
- By:
- Publication type:
- Article
Feature Selection for Intrusion Detection Using Independence Level Test with an Exhaustive Approach.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 5, p. 637, doi. 10.22266/ijies2023.1031.54
- By:
- Publication type:
- Article
Analysis of Botnet Attack Communication Pattern Behavior on Computer Networks.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2022, v. 15, n. 4, p. 533, doi. 10.22266/ijies2022.0831.48
- By:
- Publication type:
- Article
Minimizing Sample Space to Optimize Quality of Stego-Audio.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2022, v. 15, n. 3, p. 205, doi. 10.22266/ijies2022.0630.17
- By:
- Publication type:
- Article
Video-based Data Hiding by Exploring Prediction Error and Histogram Shifting.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2022, v. 15, n. 1, p. 167, doi. 10.22266/ijies2022.0228.16
- By:
- Publication type:
- Article
Mirroring-Based Data Hiding in Audio.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 5, p. 550, doi. 10.22266/ijies2021.1031.48
- By:
- Publication type:
- Article
ANOVA-SVM for Selecting Subset Features in Encrypted Internet Traffic Classification.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 2, p. 536, doi. 10.22266/ijies2021.0430.48
- By:
- Publication type:
- Article
Enhancing Quality of the Stego Image by Using Histogram Partition and Prediction Error.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 2, p. 511, doi. 10.22266/ijies2021.0430.46
- By:
- Publication type:
- Article
Data Reduction for Optimizing Feature Selection in Modeling Intrusion Detection System.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 6, p. 199, doi. 10.22266/ijies2020.1231.18
- By:
- Publication type:
- Article
Utilizing Fuzzy Logic in Developing Reversible Data Hiding Method.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 5, p. 327, doi. 10.22266/ijies2020.1031.30
- By:
- Publication type:
- Article
Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 3, p. 433, doi. 10.22266/ijies2020.0630.39
- By:
- Publication type:
- Article
Analyzing the Performance of Intrusion Detection Model Using Weighted One-Against-One Support Vector Machine and Feature Selection for Imbalanced Classes.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 2, p. 151, doi. 10.22266/ijies2020.0430.15
- By:
- Publication type:
- Article
Improving the Performance of Data Hiding by Designing Three Samples-based Smoothing in Audio.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 2, p. 196, doi. 10.22266/ijies2020.0430.19
- By:
- Publication type:
- Article
Improving the Quality of Stego Image Using Prediction Error and Histogram Modification.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 5, p. 95, doi. 10.22266/ijies2019.1031.10
- By:
- Publication type:
- Article
Increasing Accuracy and Completeness of Intrusion Detection Model Using Fusion of Normalization, Feature Selection Method and Support Vector Machine.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 4, p. 378, doi. 10.22266/ijies2019.0831.35
- By:
- Publication type:
- Article
Cluster Analysis-Based Approach Features Selection on Machine Learning for Detecting Intrusion.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 4, p. 233, doi. 10.22266/ijies2019.0831.22
- By:
- Publication type:
- Article
Reversible Data Hiding in Audio Based on Discrete Cosine Transform and Location Maps.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 3, p. 41, doi. 10.22266/ijies2019.0630.05
- By:
- Publication type:
- Article
Sensitivity of a Convolutional Neural Network for Different Pooling Layers in Spatial Domain Steganalysis.
- Published in:
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 4, p. 1653, doi. 10.18280/isi.290438
- By:
- Publication type:
- Article
Reversible data hiding method by extending reduced difference expansion.
- Published in:
- International Journal of Advances in Intelligent Informatics, 2019, v. 5, n. 2, p. 101, doi. 10.26555/ijain.v5i2.351
- By:
- Publication type:
- Article
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 4, p. 2468, doi. 10.11591/ijece.v8i4.pp2468-2476
- By:
- Publication type:
- Article
Reversible Data Hiding with Fuzzification and Smooth Distribution of Samples in Various Audio Genres.
- Published in:
- International Review on Modelling & Simulations, 2024, v. 17, n. 2, p. 54, doi. 10.15866/iremos.v17i2.23491
- By:
- Publication type:
- Article
Fuzzy Logic and the Greatest Common Divisor on Audio-Based Data Hiding Method.
- Published in:
- International Review on Modelling & Simulations, 2022, v. 15, n. 3, p. 172, doi. 10.15866/iremos.v15i3.22235
- By:
- Publication type:
- Article