Seguir
Dr Biju Issac (CEng, SFHEA & SMIEEE)
Dr Biju Issac (CEng, SFHEA & SMIEEE)
Associate Prof, Director of ACE-CSR, Head of Subject (Networks & Cybersecurity), Northumbria Uni, UK
Dirección de correo verificada de ieee.org - Página principal
Título
Citado por
Citado por
Año
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac
Future Generation Computer Systems 80, 157-170, 2018
2932018
The mobile devices and its mobile learning usage analysis
SM Jacob, B Issac
arXiv preprint arXiv:1410.4375, 2008
2342008
Mobile technologies and its impact-an analysis in higher education context.
SM Jacob, B Issac
International Journal of Interactive Mobile Technologies 2 (1), 2008
1072008
IoT-based Android Malware Detection using Graph Neural Network with Adversarial Defense
R Yumlembam, B Issac, SM Jacob, L Yang
IEEE Internet of Things Journal, 2022
882022
Detecting spam email with machine learning optimized with bio-inspired metaheuristic algorithms
S Gibson, B Issac, L Zhang, SM Jacob
IEEE Access 8, 187914-187932, 2020
882020
Analysis of WiFi and WiMAX and Wireless Network Coexistence
S Song, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (6), 63-78, 2014
752014
A Survey on Biometrics and Cancelable Biometrics Systems
B Choudhury, P Then, B Issac, V Rahman, MK Haldar
International Journal of Image and Graphics 18 (1), 39 pages, 2018
682018
Mobile learning culture and effects in higher education
SM Jacob, B Issac
arXiv preprint arXiv:1410.4379, 2007
592007
Intelligent spam classification for mobile text message
K Mathew, B Issac
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
572011
Implementing spam detection using Bayesian and Porter Stemmer keyword stripping approaches
B Issac, WJ Jap
TENCON 2009-2009 IEEE Region 10 Conference, 1-5, 2009
562009
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
B Issac
International Journal of Network Security 8 (2), 107-118, 2009
40*2009
Different Firewall Techniques: A Survey
RK Sharma, HK Kalita, B Issac
2014 International Conference on Computing, Communication and Networking …, 2014
392014
Detection of Hate Tweets using Machine Learning and Deep Learning
L Ketsbaia, B Issac, X Chen
IEEE TrustCom 2020 - 19th IEEE International Conference on Trust, Security …, 2020
382020
Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
M Albayati, B Issac
International Journal of Computational Intelligence Systems 8 (5), 841-853, 2015
342015
Appraising the corporate sustainability reports–text mining and multi-discriminatory analysis
JR Modapothala, B Issac, E Jayamani
Innovations in computing sciences and software engineering, 489-494, 2010
322010
Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring
AM Shahi, B Issac, JR Modapothala
International Journal of Computational Intelligence and Applications (IJCIA …, 2014
312014
Analysis of IPv6 Transition Technologies
A Albkerat, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (5), 19-38, 2014
292014
Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses
B Issac, WJ Jap, JH Sutanto
2009 International conference on computer engineering and technology 2, 326-330, 2009
282009
Enhanced Cuckoo Search Algorithm for Virtual Machine Placement in Cloud Data Centers
E Barlaskar, J Singh, B Issac
International Journal of Grid and Utility Computing 9 (1), 1-17, 2018
262018
Secure unicast address resolution protocol (S-UARP) by extending DHCP
B Issac, LA Mohammed
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
242005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20