Search Results - "Issac, Biju"
-
1
Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms
Published in IEEE access (2020)“…Electronic mail has eased communication methods for many organisations as well as individuals. This method is exploited for fraudulent gain by spammers through…”
Get full text
Journal Article -
2
AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems
Published in Scientific reports (14-11-2022)“…Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on…”
Get full text
Journal Article -
3
GC-rich sequence elements recruit PRC2 in mammalian ES cells
Published in PLoS genetics (01-12-2010)“…Polycomb proteins are epigenetic regulators that localize to developmental loci in the early embryo where they mediate lineage-specific gene repression. In…”
Get full text
Journal Article -
4
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
Published in Sensors (Basel, Switzerland) (14-06-2023)“…The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world…”
Get full text
Journal Article -
5
Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping
Published in IEEE access (2024)“…Class imbalance problems have received a lot of attention throughout the last few years. It poses considerable hurdles to conventional classifiers, especially…”
Get full text
Journal Article -
6
Genome-wide maps of chromatin state in pluripotent and lineage-committed cells
Published in Nature (02-08-2007)“…We report the application of single-molecule-based sequencing technology for high-throughput profiling of histone modifications in mammalian cells. By…”
Get full text
Journal Article -
7
A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection
Published in IEEE access (01-01-2023)“…Social media has revolutionized the way individuals connect and share information globally. However, the rise of these platforms has led to the proliferation…”
Get full text
Journal Article -
8
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants
Published in IEEE access (01-01-2019)“…The security of resources in a corporate network is always important to the organization. For this reason, different techniques such as firewall, Intrusion…”
Get full text
Journal Article -
9
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
Published in International journal of computational intelligence systems (01-01-2015)“…In this paper we discuss and analyze some of the intelligent classifiers which allows for automatic detection and classification of networks attacks for any…”
Get full text
Journal Article -
10
Perturbation of B Cell Gene Expression Persists in HIV-Infected Children Despite Effective Antiretroviral Therapy and Predicts H1N1 Response
Published in Frontiers in immunology (11-09-2017)“…Despite effective antiretroviral therapy (ART), HIV-infected individuals with apparently similar clinical and immunological characteristics can vary in…”
Get full text
Journal Article -
11
Constitutively Active MAVS Inhibits HIV-1 Replication via Type I Interferon Secretion and Induction of HIV-1 Restriction Factors
Published in PloS one (05-02-2016)“…Type I interferon is known to inhibit HIV-1 replication through the induction of interferon stimulated genes (ISG), including a number of HIV-1 restriction…”
Get full text
Journal Article -
12
Long-Term Characteristics of Human-Derived Biliary Organoids under a Single Continuous Culture Condition
Published in Cells (Basel, Switzerland) (27-11-2022)“…Organoids have been used to investigate the three-dimensional (3D) organization and function of their respective organs. These self-organizing 3D structures…”
Get full text
Journal Article -
13
Productively infected murine Kaposi's sarcoma-like tumors define new animal models for studying and targeting KSHV oncogenesis and replication
Published in PloS one (28-01-2014)“…Kaposi's sarcoma (KS) is an AIDS-defining cancer caused by the KS-associated herpesvirus (KSHV). KS tumors are composed of KSHV-infected spindle cells of…”
Get full text
Journal Article -
14
Spectral Repeat Finder (SRF): identification of repetitive sequences using Fourier transformation
Published in Bioinformatics (12-06-2004)“…Motivation: Repetitive DNA sequences, besides having a variety of regulatory functions, are one of the principal causes of genomic instability. Understanding…”
Get full text
Journal Article -
15
Online Voting System based on Image Steganography and Visual Cryptography
Published in Journal of computing and information technology (01-03-2017)“…This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE…”
Get full text
Journal Article Paper -
16
StRAP: an integrated resource for profiling high-throughput cancer genomic data from stress response studies
Published in PloS one (17-12-2012)“…The increasing availability and maturity of DNA microarray technology has led to an explosion of cancer profiling studies for identifying cancer biomarkers,…”
Get full text
Journal Article -
17
Performance comparison of intrusion detection systems and application of machine learning to Snort system
Published in Future generation computer systems (01-03-2018)“…This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious…”
Get full text
Journal Article -
18
Genome-wide mRNA and miRNA expression data analysis to screen for markers involved in sarcomagenesis in human chondrosarcoma cell lines
Published in Genomics data (01-12-2014)“…Genes and miRNAs involved in sarcomagenesis related pathways are unknown and therefore signaling events leading to mesenchymal cell transformation to sarcoma…”
Get full text
Journal Article -
19
Ensemble LOF-based detection of false data injection in smart grid demand response system
Published in Computers & electrical engineering (01-05-2024)“…Demand response (DR) systems are prone to false data injection attacks (FDIA), which present substantial economic and operational hazards. Notwithstanding…”
Get full text
Journal Article -
20
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers
Published in Information fusion (01-11-2024)“…Botnets are computer networks controlled by malicious actors that present significant cybersecurity challenges. They autonomously infect, propagate, and…”
Get full text
Journal Article