Ciza Thomas

Orcid: 0000-0002-1030-3000

According to our database1, Ciza Thomas authored at least 23 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Validating network attack concepts: A TCAV-driven approach.
J. Comput. Virol. Hacking Tech., November, 2024

Detection and classification of breast cancer in mammogram images using entropy-based Fuzzy C-Means Clustering and RMCNN.
Multim. Tools Appl., July, 2024

Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms.
Expert Syst. J. Knowl. Eng., July, 2024

2023
XAI for intrusion detection system: comparing explanations based on global and local scope.
J. Comput. Virol. Hacking Tech., June, 2023

Brain tumor detection in MRI images using Adaptive-ANFIS classifier with segmentation of tumor and edema.
Soft Comput., March, 2023

2022
Ontology-Based Emotional Decision-Making in Self-Evolving Defensive Agents.
IEEE Access, 2022

2021
Game theoretical analysis of usable security and privacy.
Secur. Priv., 2021

ProDroid - An Android malware detection framework based on profile hidden Markov model.
Pervasive Mob. Comput., 2021

Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm.
J. Parallel Distributed Comput., 2021

Detection of Brain Tumor in MRI Images Using Optimized ANFIS Classifier.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

2020
Improved PSO for optimizing the performance of intrusion detection systems.
J. Intell. Fuzzy Syst., 2020

Detection of distributed denial of service attacks based on information theoretic approach in time series models.
J. Inf. Secur. Appl., 2020

2019
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic.
Comput. Secur., 2019

2018
Machine Learning-Based Restart Policy for CDCL SAT Solvers.
Proceedings of the Theory and Applications of Satisfiability Testing - SAT 2018, 2018

A Survey on Metamorphic Malware Detection based on Hidden Markov Model.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2013
Improving intrusion detection for imbalanced network traffic.
Secur. Commun. Networks, 2013

2009
Improvement in intrusion detection with advances in sensor fusion.
IEEE Trans. Inf. Forensics Secur., 2009

2008
Advanced sensor fusion technique for enhanced Intrusion Detection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Modified evidence theory for performance enhancement of Intrusion Detection Systems.
Proceedings of the 11th International Conference on Information Fusion, 2008

Performance enhancement of Intrusion Detection Systems using advances in sensor fusion.
Proceedings of the 11th International Conference on Information Fusion, 2008

Usefulness of DARPA dataset for intrusion detection system evaluation.
Proceedings of the Data Mining, 2008

Improvement in minority attack detection with skewness in network traffic.
Proceedings of the Data Mining, 2008

2007
Selection of intrusion detection system threshold bounds for effective sensor fusion.
Proceedings of the Data Mining, 2007


  Loading...