Performance comparison of intrusion detection systems and application of machine learning to Snort system SAR Shah, B Issac Future Generation Computer Systems 80, 157-170, 2018 | 267 | 2018 |
The mobile devices and its mobile learning usage analysis SM Jacob, B Issac arXiv preprint arXiv:1410.4375, 2008 | 236 | 2008 |
Mobile technologies and its impact-an analysis in higher education context. SM Jacob, B Issac International Journal of Interactive Mobile Technologies 2 (1), 2008 | 103 | 2008 |
Analysis of WiFi and WiMAX and Wireless Network Coexistence S Song, B Issac International Journal of Computer Networks & Communications (IJCNC) 6 (6), 63-78, 2014 | 73 | 2014 |
Detecting spam email with machine learning optimized with bio-inspired metaheuristic algorithms S Gibson, B Issac, L Zhang, SM Jacob IEEE Access 8, 187914-187932, 2020 | 67 | 2020 |
A Survey on Biometrics and Cancelable Biometrics Systems B Choudhury, P Then, B Issac, V Rahman, MK Haldar International Journal of Image and Graphics 18 (1), 39 pages, 2018 | 61 | 2018 |
IoT-based Android Malware Detection using Graph Neural Network with Adversarial Defense R Yumlembam, B Issac, SM Jacob, L Yang IEEE Internet of Things Journal, 2022 | 59 | 2022 |
Mobile learning culture and effects in higher education SM Jacob, B Issac arXiv preprint arXiv:1410.4379, 2007 | 59 | 2007 |
Intelligent spam classification for mobile text message K Mathew, B Issac Proceedings of 2011 International Conference on Computer Science and Network …, 2011 | 55 | 2011 |
Implementing spam detection using Bayesian and Porter Stemmer keyword stripping approaches B Issac, WJ Jap TENCON 2009-2009 IEEE Region 10 Conference, 1-5, 2009 | 54 | 2009 |
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. B Issac International Journal of Network Security 8 (2), 107-118, 2009 | 40* | 2009 |
Different Firewall Techniques: A Survey RK Sharma, HK Kalita, B Issac 2014 International Conference on Computing, Communication and Networking …, 2014 | 37 | 2014 |
Detection of Hate Tweets using Machine Learning and Deep Learning L Ketsbaia, B Issac, X Chen IEEE TrustCom 2020 - 19th IEEE International Conference on Trust, Security …, 2020 | 32 | 2020 |
Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system M Albayati, B Issac International Journal of Computational Intelligence Systems 8 (5), 841-853, 2015 | 32 | 2015 |
Analysis of IPv6 Transition Technologies A Albkerat, B Issac International Journal of Computer Networks & Communications (IJCNC) 6 (5), 19-38, 2014 | 30 | 2014 |
Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring AM Shahi, B Issac, JR Modapothala International Journal of Computational Intelligence and Applications (IJCIA …, 2014 | 29 | 2014 |
Appraising the corporate sustainability reports–text mining and multi-discriminatory analysis JR Modapothala, B Issac, E Jayamani Innovations in computing sciences and software engineering, 489-494, 2010 | 28 | 2010 |
Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses B Issac, WJ Jap, JH Sutanto 2009 International conference on computer engineering and technology 2, 326-330, 2009 | 28 | 2009 |
Enhanced Cuckoo Search Algorithm for Virtual Machine Placement in Cloud Data Centers E Barlaskar, J Singh, B Issac International Journal of Grid and Utility Computing 9 (1), 1-17, 2018 | 25 | 2018 |
Secure unicast address resolution protocol (S-UARP) by extending DHCP B Issac, LA Mohammed 2005 13th IEEE International Conference on Networks Jointly held with the …, 2005 | 24 | 2005 |