38 results on '"MAAROF, MOHD AIZAINI"'
Search Results
2. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
3. An optimized skin texture model using gray-level co-occurrence matrix
4. Fraud detection system: A survey
5. GAZELLE: An Enhanced Random Network Coding Based Framework for Efficient P2P Live Video Streaming Over Hybrid WMNs
6. Enhancing the detection of metamorphic malware using call graphs
7. Adaptive and online data anomaly detection for wireless sensor systems
8. Efficient image duplicated region detection model using sequential block clustering
9. An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications
10. Efficient P2P Live Video Streaming Over Hybrid WMNs Using Random Network Coding
11. GREENIE: a novel hybrid routing protocol for efficient video streaming over wireless mesh networks
12. Fast and Effective Bag-of-Visual-Word Model to Pornographic Images Recognition Using the FREAK Descriptor
13. Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts.
14. Big Data Analytics Adoption for Cybersecurity: A Review of Current Solutions, Requirements, Challenges and Trends.
15. In memory detection of Windows API call hooking technique.
16. Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.
17. Design Consideration for Improved Term Weighting Scheme for Pornographic Web sites.
18. Malware behavior image for malware variant identification.
19. Improved skin detection based on dynamic threshold using multi-colour space.
20. Islamic Web Content Filtering and Categorization on Deviant Teaching.
21. Enhanced Rules Application Order Approach to Stem Reduplication Words in Malay Texts.
22. A Hybrid Color Space for Skin Detection Using Genetic Algorithm Heuristic Search and Principal Component Analysis Technique.
23. Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment.
24. Dynamic Innate Immune System Model for Malware Detection.
25. A Novel Malware Detection Framework Based on Innate Immunity and Danger Theory.
26. Malware Detection Techniques Using Artificial Immune System.
27. Design of Adaptive IDS with Regulated Retraining Approach.
28. A sinkhole attack detection scheme in Mintroute wireless Sensor Networks.
29. Malware Analysis with Multiple Features.
30. Spiral unique sequence: A new rotation invariant feature for small-size image block matching.
31. Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection.
32. Polymorphism and Danger Susceptibility of System Call DASTONs.
33. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues.
34. IMPROVED WEB PAGE IDENTIFICATION METHOD USING NEURAL NETWORKS.
35. Intrusion Detection System Using Unsupervised Immune Network Clustering with Reduced Features.
36. Intelligent Alert Clustering Model for Network Intrusion Analysis.
37. Challenges in high accuracy of malware detection.
38. Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.