Biju Issac

According to our database1, Biju Issac authored at least 40 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Are machine learning based intrusion detection system always secure? An insight into tampered learning.
Journal of Intelligent and Fuzzy Systems, 2018

A Survey on Biometrics and Cancelable Biometrics Systems.
Int. J. Image Graphics, 2018

Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres.
IJGUC, 2018

Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning.
International Journal of Computational Intelligence and Applications, 2018

Performance comparison of intrusion detection systems and application of machine learning to Snort system.
Future Generation Comp. Syst., 2018

Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments.
Wireless Communications and Mobile Computing, 2017

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System.
CoRR, 2017

Online Voting System based on Image Steganography and Visual Cryptography.
CIT, 2017

Energy-efficient virtual machine placement using enhanced firefly algorithm.
Multiagent and Grid Systems, 2016

Implementation and Evaluation of Steganography Based Online Voting System.
IJEGR, 2016

Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks.
IJBDCN, 2016

Evaluation of antenna performance for use in wide band wireless protocols.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System.
Int. J. Comput. Intell. Syst., 2015

Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System.
CoRR, 2015

PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015

Performance analysis of RTS/CTS protocol over Basic Access in wireless networks.
Proceedings of the 9th International Conference on IT in Asia, 2015

Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring.
International Journal of Computational Intelligence and Applications, 2014

Analysis of WiFi and WiMAX and Wireless Network Coexistence.
CoRR, 2014

Analysis of corporate environmental reports using statistical techniques and data mining.
CoRR, 2014

Problem Based Learning and Implementations.
CoRR, 2014

Formative Assessment and its E-learning Implementation.
CoRR, 2014

Mobile Learning Culture and Effects in Higher Education.
CoRR, 2014

The mobile devices and its mobile learning usage analysis.
CoRR, 2014

Analysis of Phishing Attacks and Countermeasures.
CoRR, 2014

Analysis of IPv6 Transition Technologies.
CoRR, 2014

Analysis of Demand Driven Ad-hoc Routing Protocols on Performance and Mobility.
CoRR, 2014

QoS Survey in IPv6 and Queuing Methods.
CoRR, 2014

Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining.
CoRR, 2014

Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks.
CoRR, 2014

Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
CoRR, 2014

Ambient noise analysis on sound for use in wireless digital transmission.
Proceedings of the 8th International Conference on Information Technology in Asia, 2013

Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
I. J. Network Security, 2009

Appraising the Corporate Sustainability Reports - Text Mining and Multi-Discriminatory Analysis.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

Mobile Technologies and its Impact - An Analysis in Higher Education Context.
iJIM, 2008

Effects of Online MCQ Tests on Student Learning.
Proceedings of the Technological Developments in Education and Automation, 2008

First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

War Driving and WLAN Security Issues - Attacks, Security Design and Remedies.
IS Management, 2007

Detailed DoS attacks in wireless networks and countermeasures.
IJAHUC, 2007

Impact on Student Learning From Traditional Continuous Assessment and an E-Assessment Proposal.
Proceedings of the Pacific Asia Conference on Information Systems, 2006