Search Results - "Ikram, Sumaiya Thaseen"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class SVM by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar

    “…Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection…”
    Get full text
    Journal Article
  2. 2

    An Intelligent Waste Management Application Using IoT and a Genetic Algorithm–Fuzzy Inference System by Thaseen Ikram, Sumaiya, Mohanraj, Vanitha, Ramachandran, Sakthivel, Balakrishnan, Anbarasu

    Published in Applied sciences (01-03-2023)
    “…The Internet of Things (IoT) is being used to create new applications for smart cities. Waste management is one issue that requires various IoT components for…”
    Get full text
    Journal Article
  3. 3

    Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar

    “…Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are…”
    Get full text
    Journal Article Paper
  4. 4

    Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier by Ikram, Sumaiya Thaseen, Priya, V., Anbarasu, B., Cheng, Xiaochun, Ghalib, Muhammad Rukunuddin, Shankar, Achyut

    Published in The Journal of supercomputing (01-05-2022)
    “…Several organizations are implementing large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new…”
    Get full text
    Journal Article
  5. 5

    Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar, Poorva, Babu, Ushasree, Pamidi Sai, Zhang, Yishuo, Liu, Xiao, Li, Gang

    “…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
    Get full text
    Journal Article
  6. 6

    Live video streaming service with pay-as-you-use model on Ethereum Blockchain and InterPlanetary file system by Lopes, Elio Jordan, Kataria, Shaolin, Keshav, Shashank, Ikram, Sumaiya Thaseen, Ghalib, Muhammad Rukunuddin, Shankar, Achyut, Krichen, Moez

    Published in Wireless networks (01-10-2022)
    “…In centralized video streaming platforms, the platform owner, rather than the content producer, controls most of the content uploaded on the centralized video…”
    Get full text
    Journal Article
  7. 7

    DAIDNet: A Lightweight Domain-Aware Architecture for Automated Detection of Network Penetrations by Gupta, Prajjwal, Jain, Aviral, Ikram, Sumaiya Thaseen, Gadekallu, Thippa Reddy, Srivastava, Gautam

    “…Intrusion detection and prevention has been an area of active research in the use of machine learning for cyber security practices. Artificial Neural Networks…”
    Get full text
    Journal Article
  8. 8

    Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar, Poorva, Babu, Ushasree, Pamidi Sai, Zhang, Yishuo, Liu, Xiao, Li, Gang

    “…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
    Get full text
    Journal Article