Publications

(2023). Enhancing Cloud Security with a Fuzzy Rule-Based Classifier for Intrusion Detection and Classification. 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA).

Cite DOI URL

(2023). EEG Classification Using Reinforcement Learning and Swarm-Based Deep Sparse Autoencoder. 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA).

Cite DOI URL

(2023). Revolutionizing IoT Network Security with Deep Learning-Anomaly Detection Model. 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC).

Cite DOI URL

(2023). Adaptive Cyber Defense: Leveraging Neuromorphic Computing for Advanced Threat Detection and Response. 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS).

Cite DOI URL

(2023). Cauchy Grasshopper Optimization Algorithm with Deep Learning Model for Cloud Enabled Cyber Threat Detection System. 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS).

Cite DOI URL

(2023). Lattice-based Cryptography for IoT and Cloud Security.

Cite

(2022). Efficient Data Hiding Method in Image Based on Modified LSB. 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC).

Cite DOI URL

(2022). An Overview on Emerging Security Threats in Big Data Clusters and their Defenses. 2022 International Conference on Edge Computing and Applications (ICECAA).

Cite DOI URL

(2022). Stego Dog: Image Steganography Tool for Confidentiality and Integrity. 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS).

Cite DOI URL

(2021). IMPERCEPTIBLE MALWARE: BYPASSING MODERN AV - ENGINES BY AI-ASSISTED.

Cite

(2015). An example journal article. Journal of Source Themes, 1(1).

PDF Cite Code Slides

(2013). An example conference paper. In ICW.

PDF Cite Code Dataset Project Slides Video Source Document