Search for persons
X
?
2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) ,
1
VGG-SSD Model for Weapon Detection using Image Processing:
, In:
?
Inventive Computation and Information Technologies; Lecture Notes in Networks and Systems ,
6
Application of Whale Optimization Algorithm in DDOS Attack ..:
, In:
?
2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) ,
8
Feature Selection and Evaluation of Permission-based Androi..:
, In:
?
Advances in Intelligent Systems and Computing; Progress in Computing, Analytics and Networking ,
9
A Survey of Feature Selection Techniques in Intrusion Detec..:
, In:
?
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) ,
10
Android mobile security by detecting and classification of ..:
, In:
?
Soft Computing and Signal Processing; Smart Innovation, Systems and Technologies ,
12