Search Results - "Issac, Biju"

Refine Results
  1. 1

    Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms by Gibson, Simran, Issac, Biju, Zhang, Li, Jacob, Seibu Mary

    Published in IEEE access (2020)
    “…Electronic mail has eased communication methods for many organisations as well as individuals. This method is exploited for fraudulent gain by spammers through…”
    Get full text
    Journal Article
  2. 2

    AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems by Rafiq, Husnain, Aslam, Nauman, Aleem, Muhammad, Issac, Biju, Randhawa, Rizwan Hamid

    Published in Scientific reports (14-11-2022)
    “…Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on…”
    Get full text
    Journal Article
  3. 3

    GC-rich sequence elements recruit PRC2 in mammalian ES cells by Mendenhall, Eric M, Koche, Richard P, Truong, Thanh, Zhou, Vicky W, Issac, Biju, Chi, Andrew S, Ku, Manching, Bernstein, Bradley E

    Published in PLoS genetics (01-12-2010)
    “…Polycomb proteins are epigenetic regulators that localize to developmental loci in the early embryo where they mediate lineage-specific gene repression. In…”
    Get full text
    Journal Article
  4. 4

    Plant and Salamander Inspired Network Attack Detection and Data Recovery Model by Sharma, Rupam Kumar, Issac, Biju, Xin, Qin, Gadekallu, Thippa Reddy, Nath, Keshab

    Published in Sensors (Basel, Switzerland) (14-06-2023)
    “…The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world…”
    Get full text
    Journal Article
  5. 5

    Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping by Ahmed, Zahid, Issac, Biju, Das, Sufal

    Published in IEEE access (2024)
    “…Class imbalance problems have received a lot of attention throughout the last few years. It poses considerable hurdles to conventional classifiers, especially…”
    Get full text
    Journal Article
  6. 6
  7. 7

    A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection by Ketsbaia, Lida, Issac, Biju, Chen, Xiaomin, Jacob, Seibu Mary

    Published in IEEE access (01-01-2023)
    “…Social media has revolutionized the way individuals connect and share information globally. However, the rise of these platforms has led to the proliferation…”
    Get full text
    Journal Article
  8. 8

    Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants by Sharma, Rupam Kumar, Issac, Biju, Kalita, Hemanta Kumar

    Published in IEEE access (01-01-2019)
    “…The security of resources in a corporate network is always important to the organization. For this reason, different techniques such as firewall, Intrusion…”
    Get full text
    Journal Article
  9. 9

    Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System by Albayati, Mohanad, Issac, Biju

    “…In this paper we discuss and analyze some of the intelligent classifiers which allows for automatic detection and classification of networks attacks for any…”
    Get full text
    Journal Article
  10. 10

    Perturbation of B Cell Gene Expression Persists in HIV-Infected Children Despite Effective Antiretroviral Therapy and Predicts H1N1 Response by Cotugno, Nicola, De Armas, Lesley, Pallikkuth, Suresh, Rinaldi, Stefano, Issac, Biju, Cagigi, Alberto, Rossi, Paolo, Palma, Paolo, Pahwa, Savita

    Published in Frontiers in immunology (11-09-2017)
    “…Despite effective antiretroviral therapy (ART), HIV-infected individuals with apparently similar clinical and immunological characteristics can vary in…”
    Get full text
    Journal Article
  11. 11

    Constitutively Active MAVS Inhibits HIV-1 Replication via Type I Interferon Secretion and Induction of HIV-1 Restriction Factors by Gupta, Sachin, Termini, James M, Issac, Biju, Guirado, Elizabeth, Stone, Geoffrey W

    Published in PloS one (05-02-2016)
    “…Type I interferon is known to inhibit HIV-1 replication through the induction of interferon stimulated genes (ISG), including a number of HIV-1 restriction…”
    Get full text
    Journal Article
  12. 12

    Long-Term Characteristics of Human-Derived Biliary Organoids under a Single Continuous Culture Condition by Aktas, Ranan G, Karski, Michael, Issac, Biju, Sun, Liang, Rockowitz, Shira, Sliz, Piotr, Vakili, Khashayar

    Published in Cells (Basel, Switzerland) (27-11-2022)
    “…Organoids have been used to investigate the three-dimensional (3D) organization and function of their respective organs. These self-organizing 3D structures…”
    Get full text
    Journal Article
  13. 13

    Productively infected murine Kaposi's sarcoma-like tumors define new animal models for studying and targeting KSHV oncogenesis and replication by Ashlock, Brittany M, Ma, Qi, Issac, Biju, Mesri, Enrique A

    Published in PloS one (28-01-2014)
    “…Kaposi's sarcoma (KS) is an AIDS-defining cancer caused by the KS-associated herpesvirus (KSHV). KS tumors are composed of KSHV-infected spindle cells of…”
    Get full text
    Journal Article
  14. 14

    Spectral Repeat Finder (SRF): identification of repetitive sequences using Fourier transformation by Sharma, Deepak, Issac, Biju, Raghava, G. P. S., Ramaswamy, R.

    Published in Bioinformatics (12-06-2004)
    “…Motivation: Repetitive DNA sequences, besides having a variety of regulatory functions, are one of the principal causes of genomic instability. Understanding…”
    Get full text
    Journal Article
  15. 15

    Online Voting System based on Image Steganography and Visual Cryptography by Rura, Lauretha, Issac, Biju, Haldar, Manas Kumar

    “…This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE…”
    Get full text
    Journal Article Paper
  16. 16

    StRAP: an integrated resource for profiling high-throughput cancer genomic data from stress response studies by Johnson, Seth, Issac, Biju, Zhao, Shuping, Bisht, Mohit, Celiku, Orieta, Tofilon, Philip, Camphausen, Kevin, Shankavaram, Uma

    Published in PloS one (17-12-2012)
    “…The increasing availability and maturity of DNA microarray technology has led to an explosion of cancer profiling studies for identifying cancer biomarkers,…”
    Get full text
    Journal Article
  17. 17

    Performance comparison of intrusion detection systems and application of machine learning to Snort system by Shah, Syed Ali Raza, Issac, Biju

    Published in Future generation computer systems (01-03-2018)
    “…This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious…”
    Get full text
    Journal Article
  18. 18

    Genome-wide mRNA and miRNA expression data analysis to screen for markers involved in sarcomagenesis in human chondrosarcoma cell lines by Issac, Biju, Galoian, Karina, Guettouche, Toumy, Navarro, Loida, Temple, H. Thomas

    Published in Genomics data (01-12-2014)
    “…Genes and miRNAs involved in sarcomagenesis related pathways are unknown and therefore signaling events leading to mesenchymal cell transformation to sarcoma…”
    Get full text
    Journal Article
  19. 19

    Ensemble LOF-based detection of false data injection in smart grid demand response system by Tirulo, Aschalew, Chauhan, Siddhartha, Issac, Biju

    Published in Computers & electrical engineering (01-05-2024)
    “…Demand response (DR) systems are prone to false data injection attacks (FDIA), which present substantial economic and operational hazards. Notwithstanding…”
    Get full text
    Journal Article
  20. 20

    Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers by Yumlembam, Rahul, Issac, Biju, Jacob, Seibu Mary, Yang, Longzhi

    Published in Information fusion (01-11-2024)
    “…Botnets are computer networks controlled by malicious actors that present significant cybersecurity challenges. They autonomously infect, propagate, and…”
    Get full text
    Journal Article