Intrusion Detection Model Using Fusion of chi square feature selection and multi class SVM STCA Kumar Journal of King Saud University, Computer and Information Sciences 29, 462-472, 2017 | 514 | 2017 |
An analysis of supervised tree based classifiers for intrusion detection system S Thaseen, CA Kumar 2013 international conference on pattern recognition, informatics and Mobile …, 2013 | 141 | 2013 |
Integrated intrusion detection model using chi-square feature selection and ensemble of classifiers IS Thaseen, CA Kumar, A Ahmad Arabian Journal for Science and Engineering 44, 3357-3368, 2019 | 104 | 2019 |
Intrusion Detection Model using PCA and optimized SVM CAK I.Sumaiya Thaseen CIT Journal of Computing and Information Technology 24 (2), 133-148, 2016 | 96* | 2016 |
An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network I Sumaiya Thaseen, J Saira Banu, K Lavanya, M Rukunuddin Ghalib, ... Transactions on Emerging Telecommunications Technologies 32 (2), e4014, 2021 | 77 | 2021 |
Intrusion Detection Model using fusion of PCA and optimized SVM CAK I.Sumaiya Thaseen Proceedings of 2014 International Conference on Computing and Informatics …, 2014 | 74* | 2014 |
Anomaly detection using XGBoost ensemble of deep neural network models ST Ikram, AK Cherukuri, B Poorva, PS Ushasree, Y Zhang, X Liu, G Li Cybernetics and information technologies 21 (3), 175-188, 2021 | 57 | 2021 |
Robust attack detection approach for IIoT using ensemble classifier V Priya, IS Thaseen, TR Gadekallu, MK Aboudaif, EA Nasr arXiv preprint arXiv:2102.01515, 2021 | 51 | 2021 |
Generation of secure one-time password based on image authentication H Parmar, N Nainan, S Thaseen Journal of Computer Science and Information Technology 7, 195-206, 2012 | 48 | 2012 |
Analysis on improving the performance of machine learning models using feature selection technique NM Khan, N Madhav C, A Negi, IS Thaseen Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 44 | 2020 |
Network intrusion detection using machine learning techniques IS Thaseen, B Poorva, PS Ushasree 2020 International conference on emerging trends in information technology …, 2020 | 38 | 2020 |
A hybrid anomaly detection model using g-lda AK Kasliwal B, Bhatia S,Saini.S, Thaseen.I.S Advance Computing Conference (IACC) 2014 IEEE International, 288-293, 2014 | 35* | 2014 |
Identification of phishing attack in websites using random forest-svm hybrid model A Pandey, N Gill, K Sai Prasad Nadendla, IS Thaseen Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 33 | 2020 |
Intrusion detection model using chi square feature selection and modified Naïve Bayes classifier IS Thaseen, CA Kumar Proceedings of the 3rd International Symposium on Big Data and Cloud …, 2016 | 29 | 2016 |
Performance analysis of FSR, LAR and ZRP routing protocols in MANET IS Thaseen, K Santhi International Journal of Computer Applications 41 (4), 2012 | 20 | 2012 |
Network Attacks Identification using consistency based feature selection and self organizing maps CAK Zeon Trevor Fernando,Sumaiya Thaseen First International Conference on Networks and Soft Computing, 162-166, 2014 | 19* | 2014 |
An Intelligent Waste Management Application Using IoT and a Genetic Algorithm–Fuzzy Inference System A Thaseen Ikram, S., Mohanraj, V., Ramachandran, S., & Balakrishnan Applied Sciences 13 (6), 1-29, 2023 | 18* | 2023 |
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier ST Ikram, V Priya, B Anbarasu, X Cheng, MR Ghalib, A Shankar The Journal of Supercomputing 78 (8), 10725-10756, 2022 | 17 | 2022 |
A performance enhancement of deepfake video detection through the use of a hybrid CNN Deep learning model ST Ikram, S Chambial, D Sood International journal of electrical and computer engineering systems 14 (2 …, 2023 | 14 | 2023 |
Live video streaming service with pay-as-you-use model on Ethereum Blockchain and InterPlanetary file system EJ Lopes, S Kataria, S Keshav, ST Ikram, MR Ghalib, A Shankar, ... Wireless Networks 28 (7), 3111-3125, 2022 | 13 | 2022 |