Efficient multi-level lung cancer prediction model using support vector machine classifier

BR Manju, V Athira, A Rajendran - IOP Conference Series …, 2021 - iopscience.iop.org
This paper aims at the requirement for an interactive learning framework which empowers
the successful checking of disorder in a patient. Principal component analysis stands out as …

A botnets circumspection: The current threat landscape, and what we know so far

EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019 - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …

[HTML][HTML] A deep density based and self-determining clustering approach to label unknown traffic

M Monshizadeh, V Khatri, R Kantola, Z Yan - Journal of Network and …, 2022 - Elsevier
Analyzing non-labeled data is a major concern in the field of intrusion detection as the attack
clusters are continuously evolving which are unknown for the system. Many studies have …

Performance evaluation of a combined anomaly detection platform

M Monshizadeh, V Khatri, BG Atli, R Kantola… - IEEE Access, 2019 - ieeexplore.ieee.org
Hybrid Anomaly Detection Model (HADM) is a platform that filters network traffic and
identifies malicious activities on the network. The platform applies data mining techniques to …

Omni: Automated ensemble with unexpected models against adversarial evasion attack

R Shu, T Xia, L Williams, T Menzies - Empirical Software Engineering, 2022 - Springer
Context Machine learning-based security detection models have become prevalent in
modern malware and intrusion detection systems. However, previous studies show that such …

Detection as a service: An SDN application

M Monshizadeh, V Khatri… - 2017 19th International …, 2017 - ieeexplore.ieee.org
In a cloud computing environment, future networks will most probably utilize network
functions virtualization (NFV) which is a network architecture concept that proposes …

A Log Parsing Framework for ALICE O2 Facilities

T Marlaithong, VC Barroso, P Phunchongharn - IEEE Access, 2023 - ieeexplore.ieee.org
The ALICE (A Large Ion Collider Experiment) detector at the European Organization for
Nuclear Research (CERN) generates a substantial volume of experimental data, demanding …

NFV security considerations for cloud-based mobile virtual network operators

M Monshizadeh, V Khatri… - 2016 24th International …, 2016 - ieeexplore.ieee.org
Cloud computing offers benefits of sharing computing and network resources among
multiple mobile network operators. To utilize such benefits, in earlier paper we proposed a …

Deep learning for predictive alerting and cyber-attack mitigation

A Imeri, O Rysavy - 2023 IEEE 13th Annual Computing and …, 2023 - ieeexplore.ieee.org
The successful security management of ICT systems and services is essential for an
effective cyber security posture. The main objective is to minimize and control the damage …

Discovering similarities in malware behaviors by clustering of API call sequences

F Al Shamsi, WL Woon, Z Aung - … Siem Reap, Cambodia, December 13-16 …, 2018 - Springer
New genres of malware are evading detection by using polymorphism, obfuscation and
encryption techniques. Hence, new strategies are needed to overcome the limitations of …