Ciza Thomas
Orcid: 0000-0002-1030-3000
According to our database1,
Ciza Thomas
authored at least 23 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., November, 2024
Detection and classification of breast cancer in mammogram images using entropy-based Fuzzy C-Means Clustering and RMCNN.
Multim. Tools Appl., July, 2024
Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms.
Expert Syst. J. Knowl. Eng., July, 2024
2023
XAI for intrusion detection system: comparing explanations based on global and local scope.
J. Comput. Virol. Hacking Tech., June, 2023
Brain tumor detection in MRI images using Adaptive-ANFIS classifier with segmentation of tumor and edema.
Soft Comput., March, 2023
2022
IEEE Access, 2022
2021
ProDroid - An Android malware detection framework based on profile hidden Markov model.
Pervasive Mob. Comput., 2021
Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm.
J. Parallel Distributed Comput., 2021
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
2020
J. Intell. Fuzzy Syst., 2020
Detection of distributed denial of service attacks based on information theoretic approach in time series models.
J. Inf. Secur. Appl., 2020
2019
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic.
Comput. Secur., 2019
2018
Proceedings of the Theory and Applications of Satisfiability Testing - SAT 2018, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
2013
Secur. Commun. Networks, 2013
2009
IEEE Trans. Inf. Forensics Secur., 2009
2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 11th International Conference on Information Fusion, 2008
Performance enhancement of Intrusion Detection Systems using advances in sensor fusion.
Proceedings of the 11th International Conference on Information Fusion, 2008
Proceedings of the Data Mining, 2008
Proceedings of the Data Mining, 2008
2007
Selection of intrusion detection system threshold bounds for effective sensor fusion.
Proceedings of the Data Mining, 2007