Biju Issac

Orcid: 0000-0002-1109-8715

Affiliations:
  • Northumbria University, UK
  • Teesside University, Middlesbrough, UK (former)


According to our database1, Biju Issac authored at least 56 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers.
Inf. Fusion, 2024

Ensemble LOF-based detection of false data injection in smart grid demand response system.
Comput. Electr. Eng., 2024

Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping.
IEEE Access, 2024

2023
IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense.
IEEE Internet Things J., May, 2023

Plant and Salamander Inspired Network Attack Detection and Data Recovery Model.
Sensors, 2023

A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection.
IEEE Access, 2023

Android Malware Classification and Optimisation Based on BM25 Score of Android API.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features.
Proceedings of the 14th International Conference on Software, 2022

A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

2020
Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms.
IEEE Access, 2020

Phishing Web Page Detection Using Optimised Machine Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Detection of Hate Tweets using Machine Learning and Deep Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift.
Int. J. Comput. Intell. Appl., 2019

Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants.
IEEE Access, 2019

2018
Are machine learning based intrusion detection system always secure? An insight into tampered learning.
J. Intell. Fuzzy Syst., 2018

A Survey on Biometrics and Cancelable Biometrics Systems.
Int. J. Image Graph., 2018

Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres.
Int. J. Grid Util. Comput., 2018

Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning.
Int. J. Comput. Intell. Appl., 2018

Performance comparison of intrusion detection systems and application of machine learning to Snort system.
Future Gener. Comput. Syst., 2018

Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets.
Proceedings of the 28th International Conference on Computer Theory and Applications, 2018

Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation.
Proceedings of the 15th International Conference on Control, 2018

2017
Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments.
Wirel. Commun. Mob. Comput., 2017

Online Voting System based on Image Steganography and Visual Cryptography.
J. Comput. Inf. Technol., 2017

2016
Energy-efficient virtual machine placement using enhanced firefly algorithm.
Multiagent Grid Syst., 2016

Implementation and Evaluation of Steganography Based Online Voting System.
Int. J. Electron. Gov. Res., 2016

Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks.
Int. J. Bus. Data Commun. Netw., 2016

Evaluation of antenna performance for use in wide band wireless protocols.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

2015
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System.
Int. J. Comput. Intell. Syst., 2015

PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015

Performance analysis of RTS/CTS protocol over Basic Access in wireless networks.
Proceedings of the 9th International Conference on IT in Asia, 2015

2014
Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring.
Int. J. Comput. Intell. Appl., 2014

Analysis of WiFi and WiMAX and Wireless Network Coexistence.
CoRR, 2014

Analysis of corporate environmental reports using statistical techniques and data mining.
CoRR, 2014

Problem Based Learning and Implementations.
CoRR, 2014

Formative Assessment and its E-learning Implementation.
CoRR, 2014

Mobile Learning Culture and Effects in Higher Education.
CoRR, 2014

The mobile devices and its mobile learning usage analysis.
CoRR, 2014

Analysis of Phishing Attacks and Countermeasures.
CoRR, 2014

Analysis of IPv6 Transition Technologies.
CoRR, 2014

Analysis of Demand Driven Ad-hoc Routing Protocols on Performance and Mobility.
CoRR, 2014

QoS Survey in IPv6 and Queuing Methods.
CoRR, 2014

Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining.
CoRR, 2014

Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks.
CoRR, 2014

A communication architecture using low frequency signals.
Proceedings of the International Conference on Data Science & Engineering, 2014

2013
Ambient noise analysis on sound for use in wireless digital transmission.
Proceedings of the 8th International Conference on Information Technology in Asia, 2013

2009
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
Int. J. Netw. Secur., 2009

Appraising the Corporate Sustainability Reports - Text Mining and Multi-Discriminatory Analysis.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
Mobile Technologies and its Impact - An Analysis in Higher Education Context.
Int. J. Interact. Mob. Technol., 2008

Effects of Online MCQ Tests on Student Learning.
Proceedings of the Technological Developments in Education and Automation, 2008

First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

2007
War Driving and WLAN Security Issues - Attacks, Security Design and Remedies.
Inf. Syst. Manag., 2007

Detailed DoS attacks in wireless networks and countermeasures.
Int. J. Ad Hoc Ubiquitous Comput., 2007

2006
Impact on Student Learning From Traditional Continuous Assessment and an E-Assessment Proposal.
Proceedings of the Pacific Asia Conference on Information Systems, 2006


  Loading...