Biju Issac
Orcid: 0000-0002-1109-8715Affiliations:
- Northumbria University, UK
- Teesside University, Middlesbrough, UK (former)
According to our database1,
Biju Issac
authored at least 56 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers.
Inf. Fusion, 2024
Ensemble LOF-based detection of false data injection in smart grid demand response system.
Comput. Electr. Eng., 2024
Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping.
IEEE Access, 2024
2023
IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense.
IEEE Internet Things J., May, 2023
Sensors, 2023
IEEE Access, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
2022
On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features.
Proceedings of the 14th International Conference on Software, 2022
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
2020
Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Int. J. Comput. Intell. Appl., 2019
IEEE Access, 2019
2018
Are machine learning based intrusion detection system always secure? An insight into tampered learning.
J. Intell. Fuzzy Syst., 2018
Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres.
Int. J. Grid Util. Comput., 2018
Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning.
Int. J. Comput. Intell. Appl., 2018
Performance comparison of intrusion detection systems and application of machine learning to Snort system.
Future Gener. Comput. Syst., 2018
Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets.
Proceedings of the 28th International Conference on Computer Theory and Applications, 2018
Proceedings of the 15th International Conference on Control, 2018
2017
Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments.
Wirel. Commun. Mob. Comput., 2017
J. Comput. Inf. Technol., 2017
2016
Multiagent Grid Syst., 2016
Int. J. Electron. Gov. Res., 2016
Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks.
Int. J. Bus. Data Commun. Netw., 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
2015
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System.
Int. J. Comput. Intell. Syst., 2015
PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015
Proceedings of the 9th International Conference on IT in Asia, 2015
2014
Int. J. Comput. Intell. Appl., 2014
Analysis of corporate environmental reports using statistical techniques and data mining.
CoRR, 2014
CoRR, 2014
Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining.
CoRR, 2014
Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks.
CoRR, 2014
Proceedings of the International Conference on Data Science & Engineering, 2014
2013
Proceedings of the 8th International Conference on Information Technology in Asia, 2013
2009
Int. J. Netw. Secur., 2009
Appraising the Corporate Sustainability Reports - Text Mining and Multi-Discriminatory Analysis.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009
2008
Int. J. Interact. Mob. Technol., 2008
Proceedings of the Technological Developments in Education and Automation, 2008
First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008
2007
Inf. Syst. Manag., 2007
Int. J. Ad Hoc Ubiquitous Comput., 2007
2006
Impact on Student Learning From Traditional Continuous Assessment and an E-Assessment Proposal.
Proceedings of the Pacific Asia Conference on Information Systems, 2006