1.
Almseidin, M ; Alzubi, M ; Kovacs, S ; Alkasassbeh, M
New York, Amerikai Egyesült Államok : IEEE (2017) pp. 277-282. , 6 p.
Közlemény:3363008 Admin láttamozott Forrás Idéző Könyvrészlet (Konferenciaközlemény ) Tudományos
Nyilvános idéző összesen: 111 | Független: 108 | Függő: 3 | Nem jelölt: 0 | WoS jelölt: 5 | Scopus jelölt: 29 | WoS/Scopus jelölt: 30 | DOI jelölt: 104
Konferenciaközlemény (Könyvrészlet) | Tudományos[3363008] [Admin láttamozott]
Nyilvános idéző összesen: 111, Független: 108, Függő: 3, Nem jelölt: 0
  1. Sanjeev Sondur et al. Towards Automated Configuration of Cloud Storage Gateways: A data driven approach. (2016)
  2. Otoum Safa et al. Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures. (2018) Megjelent: 2018 IEEE International Conference on Communications (ICC) pp. 1-6
  3. Patgiri Ripon et al. An Investigation on Intrusion Detection System Using Machine Learning. (2018) Megjelent: 2018 IEEE Symposium Series on Computational Intelligence (SSCI) pp. 1684-1691
  4. Nunley Kole et al. Detecting Network Intrusions Using a Confidence-Based Reward System. (2018) Megjelent: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) pp. 175-180
  5. Aung Yi et al. Hybrid Intrusion Detection System using K-Means and Random Tree Algorithms. (2018) Megjelent: 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribu... pp. 218-223
  6. Dadras Soodeh et al. Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment. (2018) Megjelent: 2018 Annual American Control Conference, ACC 2018 pp. 5560-5567
  7. * Almseidin M et al. Intrusion detection mechanism using fuzzy rule interpolation. (2018) JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY 1992-8645 1817-3195 96 16 5473-5488
  8. Jȩdrzejowicz Joanna et al. Parallel GEP Ensemble for Classifying Big Datasets. (2018) Megjelent: Computational Collective Intelligence. ICCCI 2018 pp. 234-242
  9. Dobson Anthony et al. Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. (2018) Megjelent: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) pp. 1-6
  10. Belenko Viacheslav et al. Synthetic datasets generation for intrusion detection in VANET. (2018) Megjelent: Proceedings of the 11th International Conference on Security of Information and Networks - SIN '18 pp. 1-6
  11. T. Nathiya et al. An Improved HNIDS in Cloud Real Time Prediction Using Fuzzy Decision Making Combination Rule. (2019) INTERNATIONAL JOURNAL OF RECENT TECHNOLOGY AND ENGINEERING (IJRTE) 2277-3878 7 5s3 p. 261
  12. Thakkar Nidhi et al. Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques. (2019) International Journal of Computer Sciences and Engineering 2347-2693 7 5 211-214
  13. Zhang Xiao et al. A Zero-Shot Intrusion Detection Method Based on Regression Model. (2019) Megjelent: 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD) pp. 186-191
  14. Naveen Bindra et al. Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset. (2019) AUTOMATIC CONTROL AND COMPUTER SCIENCES 0146-4116 53 5 419-428
  15. Bhumgara Afreen et al. Detection of Network Intrusions using Hybrid Intelligent Systems. (2019) Megjelent: 2019 1st International Conference on Advances in Information Technology (ICAIT) pp. 500-506
  16. Zwane Skhumbuzo et al. Ensemble Learning Approach for Flow-based Intrusion Detection System. (2019) Megjelent: 2019 IEEE AFRICON pp. 1-8
  17. * Mohammad Almseidin et al. Fuzzy Automaton as a Detection Mechanism for the Multi-Step Attack. (2019) International Journal on Advanced Science, Engineering and Information Technology 2088-5334 2460-6952 9 2 575-586
  18. * Mohammad Almseidin et al. Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality. (2019) International Journal on Advanced Science, Engineering and Information Technology 2088-5334 2460-6952 9 3 735-744
  19. Velliangiri S. et al. Hybrid optimization scheme for intrusion detection using considerable feature selection. (2019) NEURAL COMPUTING & APPLICATIONS 0941-0643 1433-3058 2019 1-15
  20. Jedrzejowicz Joanna et al. Implementing Gene Expression Programming in the Parallel Environment for Big Datasets Classication. (2019) VIETNAM JOURNAL OF COMPUTER SCIENCE 2196-8888 2196-8896 2019 1-15
  21. Leghris Cherkaoui et al. Improved security intrusion detection using intelligent techniques. (2019) Megjelent: 2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) pp. 1-5
  22. Hakim Lukman et al. Influence Analysis of Feature Selection to Network Intrusion Detection System Performance Using NSL-KDD Dataset. (2019) Megjelent: 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE) pp. 217-220
  23. GABRIEL DAMOUR. Information-Theoretic Framework for Network Anomaly Detection. (2019)
  24. da Costa Kelton A.P. et al. Internet of Things: A survey on machine learning-based intrusion detection approaches. (2019) COMPUTER NETWORKS 1389-1286 151 147-157
  25. Khanapuri Eshaan et al. Learning-Based Adversarial Agent Detection and Identification in Cyber Physical Systems Applied to Autonomous Vehicular Platoon. (2019) Megjelent: 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) pp. 39-45
  26. Ahmed Hambouz et al. Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters. (2019)
  27. Rai Mahima et al. Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods. (2019) Megjelent: 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) pp. 1-5
  28. Xiao Linying et al. Network Intrusion Detection Based on Hidden Markov Model and Conditional Entropy. (2019) Megjelent: Smart City and Informatization pp. 509-519
  29. Jani Kushal et al. Network Intrusion Detection System using Threat Intelligence and Deep Learning Approach. (2019) International Journal of Computer Sciences and Engineering 2347-2693 7 4 526-531
  30. Solomon Irin et al. Neural Network Based Intrusion Detection: State of the Art. (2019) SOCIAL SCIENCE RESEARCH NETWORK: SSRN 1556-5068 2019 1390-1396
  31. Wang Zhixiao et al. Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc Networks. (2019) JOURNAL OF PHYSICS-CONFERENCE SERIES 1742-6588 1742-6596 1288 1 p. 012075
  32. Hassan Aamina et al. Unsupervised Machine Learning for Malicious Network Activities. (2019) Megjelent: 2019 International Conference on Applied and Engineering Mathematics (ICAEM) pp. 151-156
  33. Bendiab Gueltoum et al. Advanced metering infrastructures. (2020) Megjelent: Proceedings of the 15th International Conference on Availability, Reliability and Security pp. 1-8
  34. Kajal Abhishek et al. A HYBRID APPROACH FOR CYBER SECURITY: IMPROVED INTRUSION DETECTION SYSTEM USING ANN-SVM. (2020) Indian Journal of Computer Science and Engineering 2231-3850 0976-5166 11 4 412-425
  35. Khan N. Maajid et al. Analysis on Improving the Performance of Machine Learning Models Using Feature Selection Technique. (2020) Megjelent: Intelligent Systems Design and Applications. ISDA 2018 2018 pp. 69-77
  36. Kumar Ashwin A. et al. An Effective Machine Learning-Based File Malware Detection—A Survey. (2020) Megjelent: International Conference on Communication, Computing and Electronics Systems pp. 355-360
  37. Musafer Hassan et al. An Enhanced Design of Sparse Autoencoder for Latent Features Extraction Based on Trigonometric Simplexes for Network Intrusion Detection Systems. (2020) ELECTRONICS 2079-9292 9 2 1-12
  38. Patil Bhimaraya et al. An Exploratory Machine Learning Technique for Investigating Intrusion in Wireless Sensor Networks. (2020) Megjelent: 2020 IEEE Bangalore Humanitarian Technology Conference (B-HTC) pp. 1-6
  39. Hooda Mohit et al. An Improved Intrusion Detection System Based on KDD Dataset Using Feature Ranking and Data Sampling. (2020) Megjelent: 2020 International Conference on Communication and Signal Processing (ICCSP) pp. 1128-1132
  40. Divakar Subham et al. A Robust Intrusion Detection System using Ensemble Machine Learning. (2020) Megjelent: 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE) pp. 344-347
  41. Shaukat Kamran et al. A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. (2020) IEEE ACCESS 2169-3536 8 222310-222354
  42. Prabaharan Dr. G et al. BEST ACCURACY PREDICTION TO NETWORK ATTACKS USING SUPERVISED MACHINE LEARNING ALGORITHM. (2020) International Journal of Engineering Applied Sciences and Technology 2455-2143 4 12 324-330
  43. Mohamad Abdul Karim. Classification of Twitter Data by Sentiment Analysis in the Malay Language. (2020) International Journal of Emerging Trends in Engineering Research 2347-3983 8 6 2730-2738
  44. Rahman Md Abdur. Detection of Distributed Denial of Service Attacks based on Machine Learning Algorithms. (2020) INTERNATIONAL JOURNAL OF SMART HOME 1975-4094 14 2 15-24
  45. Meghdouri Fares et al. EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection. (2020) Megjelent: 2020 4th Cyber Security in Networking Conference (CSNet) pp. 1-7
  46. Ingale Sanjana et al. Enhancing Multi-Step Attack Prediction using Hidden Markov Model and Naive Bayes. (2020) Megjelent: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) pp. 36-44
  47. Cocoros Peter et al. Evaluating Techniques for Practical Cloud-based Network Intrusion Detection. (2020) Megjelent: 2020 IEEE International Conference on Smart Cloud (SmartCloud) pp. 62-67
  48. Ambarkar Smita Sanjay et al. Improving Security of IoT Networks Using Machine Learning-Based Intrusion Detection System. (2020) Megjelent: Advanced Computing Technologies and Applications pp. 199-210
  49. Zhou Yunfeng et al. Intrusion Detection Based on Convolutional Neural Network in Complex Network Environment. (2020) Megjelent: Artificial Intelligence in China pp. 229-238
  50. Sumaiya Thaseen I et al. Network Intrusion Detection using Machine Learning Techniques. (2020) Megjelent: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) pp. 1-7
  51. Das Saikat et al. Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning. (2020) Megjelent: 2020 IEEE Symposium Series on Computational Intelligence (SSCI) pp. 829-835
  52. Singh Maninder Pal et al. New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. (2020) COMPUTER COMMUNICATIONS 0140-3664 154 509-527
  53. Nandi Suman et al. NIDF: An Ensemble-inspired Feature Learning Framework for Network Intrusion Detection. (2020) Megjelent: 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE) pp. 9-12
  54. Mohammad Alauthman. P2p Bot Detection Using Deep Learning With Traffic Reduction Schema. (2020) JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY 1992-8645 1817-3195 98 15 2901-2912
  55. Hostiadi Dandy Pramana et al. Port Session Communication Analysis Using Density-Based Clustering For Host Anomaly and Risk Activity Analysis. (2020) Megjelent: 2020 International Conference on Smart Technology and Applications (ICoSTA) pp. 1-6
  56. Kalimuthan C. et al. Review on intrusion detection using feature selection with machine learning techniques. (2020) MATERIALS TODAY: PROCEEDINGS 2214-7853 33 3794-3802
  57. Muhammad Ali et al. Robust Early Stage Botnet Detection using Machine Learning. (2020) Megjelent: 2020 International Conference on Cyber Warfare and Security (ICCWS) pp. 1-6
  58. Lawal Muhammad Aminu et al. Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks. (2020) IEEE ACCESS 2169-3536 8 43355-43374
  59. Swann Matthew et al. Tools for Network Traffic Generation - A Quantitative Comparison. (2020) Megjelent: World Congress on Internet Security (WorldCIS-2020) in collaboration with the International Conference for Internet Technology ... pp. 24-29
  60. A. Arul Anitha et al. Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things. (2021) INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2158-107X 2156-5570 12 11 499-506
  61. Kasongo Sydney Mambwe. An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms. (2021) IEEE ACCESS 2169-3536 9 113199-113212
  62. Varunram T N et al. Analysis of Different Dimensionality Reduction Techniques and Machine Learning Algorithms for an Intrusion Detection System. (2021) Megjelent: 2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA) pp. 237-242
  63. Dyaram Atreya et al. Analysis of Ensemble Classifiers with Feature Selection for an Effective Intrusion Detection Model. (2021) Megjelent: Proceedings of International Conference on Communication and Computational Technologies pp. 85-95
  64. Al-Imran Md et al. An Analytical Evaluation of a Deep Learning Model to Detect Network Intrusion. (2021) Megjelent: Multi-disciplinary Trends in Artificial Intelligence pp. 129-140
  65. Choi Ikje et al. An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring. (2021) Megjelent: 2021 16th Asia Joint Conference on Information Security (AsiaJCIS) pp. 1-8
  66. Tahiri Paryana et al. An Estimation of Machine Learning Approaches for Intrusion Detection System. (2021) Megjelent: 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) pp. 343-348
  67. Qtaish Osama K. et al. A new model for intrusion detection systems using bat algorithm. (2021) INTERNATIONAL JOURNAL OF INTERNET TECHNOLOGY AND SECURED TRANSACTIONS 1748-569X 1748-5703 1 1 p. 1
  68. Churcher Andrew et al. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. (2021) SENSORS 1424-8220 1424-8220 21 2 p. 446
  69. Divakar Subham et al. An Intelligent Intrusion Detection Scheme Powered by Boosting Algorithm. (2021) Megjelent: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence) pp. 205-209
  70. Archana C et al. Cloud-based Network Intrusion Detection System using Deep Learning. (2021) Megjelent: ArabWIC 2021: The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in ... pp. 1-6
  71. Diro Abebe et al. Collaborative Intrusion Detection Schemes in Fog-to-Things Computing. (2021) Megjelent: Fog/Edge Computing For Security, Privacy, and Applications pp. 93-119
  72. Wang Jenq-Haur et al. Combining Oversampling with Recurrent Neural Networks for Intrusion Detection. (2021) Megjelent: Database Systems for Advanced Applications. DASFAA 2021 International Workshops pp. 305-320
  73. Singh Samom Premson et al. Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach. (2021) Megjelent: Applied Soft Computing and Communication Networks pp. 75-87
  74. Abiyev Rahib H.. Dynamic System Control Using Z-number Based Fuzzy Neural Network. (2021) Megjelent: Intelligent and Fuzzy Techniques: Smart and Innovative Solutions pp. 964-972
  75. Raman D. et al. Efficient Machine Learning Model for Intrusion Detection—A Comparative Study. (2021) Megjelent: Machine Learning and Information Processing pp. 435-444
  76. Arora Pallavi et al. Evaluation of Machine Learning Algorithms Used on Attacks Detection in Industrial Control Systems. (2021) Journal of The Institution of Engineers (India): Series B 2250-2106 2250-2114 102 3 605-616
  77. Todorov Z. et al. FPGA Implementation of Computer Network Security Protection with Machine Learning. (2021) Megjelent: 2021 IEEE 32nd International Conference on Microelectronics (MIEL) pp. 263-266
  78. Mubarak Sinil et al. ICS Cyber Attack Detection with Ensemble Machine Learning and DPI using Cyber-kit Datasets. (2021) Megjelent: 2021 8th International Conference on Computer and Communication Engineering (ICCCE) pp. 349-354
  79. Roy Sandipan et al. Intelligent Intrusion Detection System using Supervised Learning. (2021) Megjelent: Proceedings of Intelligent Computing and Technologies Conference pp. 25-34
  80. Aljabri Malak et al. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. (2021) SENSORS 1424-8220 1424-8220 21 21 p. 7070
  81. Gupta Akshay Ramesh et al. Machine Learning-Based Intrusion Detection System with Recursive Feature Elimination. (2021) Megjelent: Inventive Computation and Information Technologies pp. 157-172
  82. Momand Mohammad Dawood et al. Machine Learning-based Multiple Attack Detection in RPL over IoT. (2021) Megjelent: 2021 International Conference on Computer Communication and Informatics (ICCCI) pp. 1-8
  83. Dake Delali Kwasi et al. Multi-Agent Reinforcement Learning Framework in SDN-IoT for Transient Load Detection and Prevention. (2021) TECHNOLOGIES 2227-7080 9 3 p. 44
  84. Al-Imran Md et al. Network Intrusion Detection: An Analytical Assessment Using Deep Learning and State-of-the-Art Machine Learning Models. (2021) INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS 1875-6891 1875-6883 14 1
  85. Shahriar Hossain et al. Network Intrusion Detection for TCP/IP Packets with Machine Learning Techniques. (2021) Megjelent: Machine Intelligence and Big Data Analytics for Cybersecurity Applications pp. 231-247
  86. Einy Sajad et al. Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network. (2021) WIRELESS COMMUNICATIONS & MOBILE COMPUTING 1530-8669 1530-8677 2021 1-12
  87. Nazir Anjum et al. Network Intrusion Detection: Taxonomy and Machine Learning Applications. (2021) Megjelent: Machine Intelligence and Big Data Analytics for Cybersecurity Applications pp. 3-28
  88. Panigrahi Ranjit et al. Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research. (2021) MATHEMATICS 2227-7390 9 6 p. 690
  89. Abirami A. et al. Proactive Network Packet Classification Using Artificial Intelligence. (2021) Megjelent: Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities pp. 169-187
  90. Iwendi Celestine et al. Security of Things Intrusion Detection System for Smart Healthcare. (2021) ELECTRONICS 2079-9292 10 12 p. 1375
  91. Gupta Prabhav et al. Stacked Autoencoder based Intrusion Detection System using One-Class Classification. (2021) Megjelent: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence) pp. 643-648
  92. Naik Binny et al. The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review. (2021) COMPLEX & INTELLIGENT SYSTEMS 2199-4536 2021 1-18
  93. Kumar Kapil et al. A Hybrid Classification Technique for Enhancing the Effectiveness of Intrusion Detection Systems Using Machine Learning. (2022) International Journal of Organizational and Collective Intelligence 1947-9344 1947-9352 12 1 1-18
  94. Balyan Amit Kumar et al. A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method. (2022) SENSORS 1424-8220 1424-8220 22 16 p. 5986
  95. Jagruthi H. et al. Analysis and Evaluation of Machine Learning Classifiers for IoT Attack Dataset. (2022) Megjelent: Machine Learning and Autonomous Systems pp. 471-482
  96. Swetha K. B. et al. An Efficient Machine Learning Approach to Recognize Dynamic Context and Action Recommendations for Attacks in Enterprise Network. (2022) Megjelent: Innovative Data Communication Technologies and Application pp. 915-928
  97. Malik Rayeesa et al. An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems. (2022) JOURNAL OF ADVANCED TRANSPORTATION 0197-6729 2022 1-17
  98. Himthani Puneet et al. Application of Machine Learning Techniques in Intrusion Detection Systems: A Systematic Review. (2022) Megjelent: Proceedings of Third International Conference on Sustainable Computing pp. 97-105
  99. Kumar Kapil. Comprehensive Composition to Spot Intrusions by Optimized Gaussian Kernel SVM. (2022) INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED ORGANIZATIONS 2155-6393 2155-6407 12 1 1-27
  100. Alkahtani Hasan et al. Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems. (2022) ELECTRONICS 2079-9292 11 11 p. 1717
  101. Amudha P. et al. Hybridization of Machine Learning Algorithm in Intrusion Detection System. (2022) Megjelent: Research Anthology on Machine Learning Techniques, Methods, and Applications pp. 596-620
  102. Mubarak Sinil et al. Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques. (2022) INTELLIGENT AUTOMATION AND SOFT COMPUTING 1079-8587 31 3 1345-1360
  103. Ylönen Marja et al. Integrated management of safety and security in Seveso sites - sociotechnical perspectives. (2022) SAFETY SCIENCE 0925-7535 1879-1042 151 p. 105741
  104. Pandey Hemlatha et al. Intrusion Detection System Based on Machine and Deep Learning Models: A Comparative and Exhaustive Study. (2022) Megjelent: Hybrid Intelligent Systems pp. 407-418
  105. Ilijanic M. et al. Intrusion detection using data mining – an overview of methods and their success. (2022) Megjelent: 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) pp. 1472-1477
  106. Wagle Prashanth P. et al. Machine Learning-Based Ensemble Network Security System. (2022) Megjelent: Recent Advances in Artificial Intelligence and Data Engineering pp. 3-15
  107. Kumudavalli M. V. et al. Machine Learning IDS Models for 5G and IoT. (2022) Megjelent: Secure Communication for 5G and IoT Networks pp. 73-84
  108. Geetha R. et al. Network attack Prediction using Supervised ML Algorithm. (2022) INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN SCIENCE, ENGINEERING AND TECHNOLOGY 2395-1990 2394-4099 9 3 190-195
  109. Jaradat Ameera S. et al. Network intrusion detection system: machine learning approach. (2022) INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE 2502-4752 2502-4760 25 2 p. 1151
  110. Srikanteswara Ramya et al. Object Detection and Voice Guidance for the Visually Impaired Using a Smart App. (2022) Megjelent: Recent Advances in Artificial Intelligence and Data Engineering pp. 133-144
  111. Javed Mohd Yousuf et al. Relationship between Sustainable Practices and Firm Performance: A Study of the FMCG Sector in India. (2022) Megjelent: Proceedings of Third International Conference on Sustainable Computing pp. 107-114
2022-10-02 12:53