iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.dagstuhl.de/pid/158/8830.rss
dblp: Santosh Kumar Sahu https://dblp.org/pid/158/8830.html dblp person page RSS feed Mon, 07 Oct 2024 21:24:02 +0200 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Santosh Kumar Sahuhttps://dblp.org/pid/158/8830.html14451 Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach.https://doi.org/10.1007/s42979-023-02516-3, , , :
Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. SN Comput. Sci. 5(1): 162 ()]]>
https://dblp.org/rec/journals/sncs/PardhiRRS24Mon, 01 Jan 2024 00:00:00 +0100
Correction: Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach.https://doi.org/10.1007/s42979-024-02669-9, , , :
Correction: Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. SN Comput. Sci. 5(2): 261 ()]]>
https://dblp.org/rec/journals/sncs/PardhiRRS24aMon, 01 Jan 2024 00:00:00 +0100
An optimal hybrid multiclass SVM for plant leaf disease detection using spatial Fuzzy C-Means model.https://doi.org/10.1016/j.eswa.2022.118989, :
An optimal hybrid multiclass SVM for plant leaf disease detection using spatial Fuzzy C-Means model. Expert Syst. Appl. 214: 118989 ()]]>
https://dblp.org/rec/journals/eswa/SahuP23Sun, 01 Jan 2023 00:00:00 +0100
Hybrid Xception transfer learning with crossover optimized kernel extreme learning machine for accurate plant leaf disease detection.https://doi.org/10.1007/s00500-023-09048-1, :
Hybrid Xception transfer learning with crossover optimized kernel extreme learning machine for accurate plant leaf disease detection. Soft Comput. 27(19): 13797-13811 ()]]>
https://dblp.org/rec/journals/soco/SahuP23Sun, 01 Oct 2023 01:00:00 +0200
Intrusion Detection using Explainable Machine Learning Techniques.https://doi.org/10.1109/OCIT59427.2023.10430641, , , , :
Intrusion Detection using Explainable Machine Learning Techniques. OCIT : 564-569]]>
https://dblp.org/rec/conf/cit/MallickRBVS23Sun, 01 Jan 2023 00:00:00 +0100
Exploring the Significance of Feature Analysis in AI/ML Modeling.https://doi.org/10.1109/OCIT59427.2023.10431396, , :
Exploring the Significance of Feature Analysis in AI/ML Modeling. OCIT : 580-585]]>
https://dblp.org/rec/conf/cit/RoutMS23Sun, 01 Jan 2023 00:00:00 +0100
From Pixels to Insights: Image Datasets for AI/ML in Software-Defined Networking.https://doi.org/10.1109/OCIT59427.2023.10430538, , , :
From Pixels to Insights: Image Datasets for AI/ML in Software-Defined Networking. OCIT : 903-908]]>
https://dblp.org/rec/conf/cit/PantMSV23Sun, 01 Jan 2023 00:00:00 +0100
Technology, price instruments and energy intensity: a study of firms in the manufacturing sector of the Indian economy.https://doi.org/10.1007/s10479-021-04295-7, , , :
Technology, price instruments and energy intensity: a study of firms in the manufacturing sector of the Indian economy. Ann. Oper. Res. 313(1): 319-339 ()]]>
https://dblp.org/rec/journals/anor/SahuBKT22Sat, 01 Jan 2022 00:00:00 +0100
A LSTM-FCNN based multi-class intrusion detection using scalable framework.https://doi.org/10.1016/j.compeleceng.2022.107720, , , , , :
A LSTM-FCNN based multi-class intrusion detection using scalable framework. Comput. Electr. Eng. 99: 107720 ()]]>
https://dblp.org/rec/journals/cee/SahuMRSPD22Sat, 01 Jan 2022 00:00:00 +0100
An Ensemble-Based Scalable Approach for Intrusion Detection Using Big Data Framework.https://doi.org/10.1089/big.2020.0201, , , , :
An Ensemble-Based Scalable Approach for Intrusion Detection Using Big Data Framework. Big Data 9(4): 303-321 ()]]>
https://dblp.org/rec/journals/bigdata/SahuMRSL21Fri, 01 Jan 2021 00:00:00 +0100
NITIDS: a robust network intrusion dataset.https://doi.org/10.1504/IJES.2021.117951, , :
NITIDS: a robust network intrusion dataset. Int. J. Embed. Syst. 14(4): 391-408 ()]]>
https://dblp.org/rec/journals/ijes/SahuMP21Fri, 01 Jan 2021 00:00:00 +0100
An Ensemble-based Outlier Detection Approach on Intrusion Detection.https://doi.org/10.1109/OCIT53463.2021.00085, , :
An Ensemble-based Outlier Detection Approach on Intrusion Detection. OCIT : 404-409]]>
https://dblp.org/rec/conf/cit/SahuMR21Fri, 01 Jan 2021 00:00:00 +0100
An SVM-Based Ensemble Approach for Intrusion Detection.https://doi.org/10.4018/IJITWE.2019010104, , , , :
An SVM-Based Ensemble Approach for Intrusion Detection. Int. J. Inf. Technol. Web Eng. 14(1): 66-84 ()]]>
https://dblp.org/rec/journals/ijitwe/SahuKKKM19Tue, 01 Jan 2019 00:00:00 +0100
K-NN Based Outlier Detection Technique on Intrusion Dataset.https://doi.org/10.4018/IJKDB.2017010105, , :
K-NN Based Outlier Detection Technique on Intrusion Dataset. Int. J. Knowl. Discov. Bioinform. 7(1): 58-70 ()]]>
https://dblp.org/rec/journals/ijkdb/SahuJV17Sun, 01 Jan 2017 00:00:00 +0100
A Multiclass SVM Classification Approach for Intrusion Detection.https://doi.org/10.1007/978-3-319-28034-9_23, :
A Multiclass SVM Classification Approach for Intrusion Detection. ICDCIT : 175-181]]>
https://dblp.org/rec/conf/icdcit/SahuJ16Fri, 01 Jan 2016 00:00:00 +0100
Appraisement and benchmarking of supply chain performance extent: A fuzzy grey relation method.https://doi.org/10.1108/GS-10-2014-0036, , :
Appraisement and benchmarking of supply chain performance extent: A fuzzy grey relation method. Grey Syst. Theory Appl. 5(1): 2-30 ()]]>
https://dblp.org/rec/journals/gsta/SahuDM15Thu, 01 Jan 2015 00:00:00 +0100
Sequence Analysis of a Subset of Plasma Membrane Raft Proteome Containing CXXC Metal Binding Motifs: Metal Binding Proteins.https://doi.org/10.4018/IJKDB.2015070101, , , :
Sequence Analysis of a Subset of Plasma Membrane Raft Proteome Containing CXXC Metal Binding Motifs: Metal Binding Proteins. Int. J. Knowl. Discov. Bioinform. 5(2): 1-15 ()]]>
https://dblp.org/rec/journals/ijkdb/SahuBGS15Thu, 01 Jan 2015 00:00:00 +0100
On selection of attributes for entropy based detection of DDoS.https://doi.org/10.1109/ICACCI.2015.7275756, , :
On selection of attributes for entropy based detection of DDoS. ICACCI : 1096-1100]]>
https://dblp.org/rec/conf/icacci/SharmaSJ15Thu, 01 Jan 2015 00:00:00 +0100