default search action
Biju Issac 0001
Person information
- affiliation: Northumbria University, UK
- affiliation (former): Teesside University, Middlesbrough, UK
Other persons with the same name
- Biju Issac 0002 — University of Miami, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Zahid Ahmed, Biju Issac, Sufal Das:
Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping. IEEE Access 12: 57458-57477 (2024) - [j24]Aschalew Tirulo, Siddhartha Chauhan, Biju Issac:
Ensemble LOF-based detection of false data injection in smart grid demand response system. Comput. Electr. Eng. 116: 109188 (2024) - [j23]Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang:
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers. Inf. Fusion 111: 102529 (2024) - [i16]Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang:
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers. CoRR abs/2409.00667 (2024) - 2023
- [j22]Lida Ketsbaia, Biju Issac, Xiaomin Chen, Seibu Mary Jacob:
A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection. IEEE Access 11: 56046-56065 (2023) - [j21]Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang:
IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense. IEEE Internet Things J. 10(10): 8432-8444 (2023) - [j20]Rupam Kumar Sharma, Biju Issac, Qin Xin, Thippa Reddy Gadekallu, Keshab Nath:
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. Sensors 23(12): 5562 (2023) - [c19]Rahul Yumlembam, Biju Issac, Longzhi Yang, Seibu Mary Jacob:
Android Malware Classification and Optimisation Based on BM25 Score of Android API. INFOCOM Workshops 2023: 1-6 - 2022
- [c18]Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. INFOCOM Workshops 2022: 1-6 - [c17]Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac, Eve O'Brien:
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. SECRYPT 2022: 325-332 - [c16]Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features. SKIMA 2022: 216-221 - 2021
- [e1]Ajith Abraham, Yukio Ohsawa, Niketa Gandhi, M. Akhil Jabbar, Abdelkrim Haqiq, Seán F. McLoone, Biju Issac:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 15-18 December 2020. Advances in Intelligent Systems and Computing 1383, Springer 2021, ISBN 978-3-030-73688-0 [contents] - 2020
- [j19]Simran Gibson, Biju Issac, Li Zhang, Seibu Mary Jacob:
Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms. IEEE Access 8: 187914-187932 (2020) - [c15]Jordan Stobbs, Biju Issac, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. TrustCom 2020: 483-490 - [c14]Lida Ketsbaia, Biju Issac, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. TrustCom 2020: 751-758 - [c13]Jack Pye, Biju Issac, Nauman Aslam, Husnain Rafiq:
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. TrustCom 2020: 1777-1782
2010 – 2019
- 2019
- [j18]Rupam Kumar Sharma, Biju Issac, Hemanta Kumar Kalita:
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants. IEEE Access 7: 52427-52439 (2019) - [j17]Niddal H. Imam, Biju Issac, Seibu Mary Jacob:
A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift. Int. J. Comput. Intell. Appl. 18(2): 1950010:1-1950010:17 (2019) - 2018
- [j16]Syed Ali Raza Shah, Biju Issac:
Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Gener. Comput. Syst. 80: 157-170 (2018) - [j15]Syed Ali Raza Shah, Biju Issac, Seibu Mary Jacob:
Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning. Int. J. Comput. Intell. Appl. 17(2): 1850007:1-1850007:17 (2018) - [j14]Esha Barlaskar, Yumnam Jayanta Singh, Biju Issac:
Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres. Int. J. Grid Util. Comput. 9(1): 1-17 (2018) - [j13]Bismita Choudhury, Patrick H. H. Then, Biju Issac, Valliappan Raman, Manas Kumar Haldar:
A Survey on Biometrics and Cancelable Biometrics Systems. Int. J. Image Graph. 18(1): 1850006:1-1850006:39 (2018) - [j12]Rupam Kumar Sharma, Hemanta Kumar Kalita, Biju Issac:
Are machine learning based intrusion detection system always secure? An insight into tampered learning. J. Intell. Fuzzy Syst. 35(3): 3635-3651 (2018) - [c12]Kamlesh Mistry, Biju Issac, Seibu Mary Jacob, Jyoti Jasekar, Li Zhang:
Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation. ICARCV 2018: 424-429 - [c11]Mohammed F. Suleiman, Biju Issac:
Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. ICCTA 2018: 19-23 - [c10]Kamlesh Mistry, Jyoti Jasekar, Biju Issac, Li Zhang:
Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour. IJCNN 2018: 1-7 - 2017
- [j11]Lauretha Rura, Biju Issac, Manas Kumar Haldar:
Online Voting System based on Image Steganography and Visual Cryptography. J. Comput. Inf. Technol. 25(1): 47-61 (2017) - [j10]Viktor Richert, Biju Issac, Nauman Israr:
Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments. Wirel. Commun. Mob. Comput. 2017 (2017) - [i15]Syed Ali Raza Shah, Biju Issac:
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System. CoRR abs/1710.04843 (2017) - 2016
- [j9]Wael Alzaid, Biju Issac:
Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks. Int. J. Bus. Data Commun. Netw. 12(1): 36-62 (2016) - [j8]Lauretha Rura, Biju Issac, Manas Kumar Haldar:
Implementation and Evaluation of Steganography Based Online Voting System. Int. J. Electron. Gov. Res. 12(3): 71-93 (2016) - [j7]Esha Barlaskar, Yumnam Jayanta Singh, Biju Issac:
Energy-efficient virtual machine placement using enhanced firefly algorithm. Multiagent Grid Syst. 12(3): 167-198 (2016) - [c9]Kuruvilla Mathew, Biju Issac, Tan Chong Eng:
Evaluation of antenna performance for use in wide band wireless protocols. APCC 2016: 54-61 - 2015
- [j6]Mohanad Albayati, Biju Issac:
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System. Int. J. Comput. Intell. Syst. 8(5): 841-853 (2015) - [c8]Kuruvilla Mathew, Biju Issac, Tan Chong Eng:
Performance analysis of RTS/CTS protocol over Basic Access in wireless networks. CITA 2015: 1-6 - [c7]Rupam Kumar Sharma, Hemanta Kumar Kalita, Biju Issac:
PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants. IBICA 2015: 105-116 - [i14]Mohanad Albayati, Biju Issac:
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System. CoRR abs/1509.08239 (2015) - 2014
- [j5]Amir Mohammad Shahi, Biju Issac, Jashua Rajesh Modapothala:
Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring. Int. J. Comput. Intell. Appl. 13(1) (2014) - [c6]Kuruvilla Mathew, Biju Issac, Tan Chong Eng:
A communication architecture using low frequency signals. ICDSE 2014: 188-193 - [i13]A. Albkerat, Biju Issac:
Analysis of IPv6 Transition Technologies. CoRR abs/1410.2013 (2014) - [i12]Biju Issac, K. Hamid, C. E. Tan:
Wireless Mobility Management with Prediction, Delay Reduction and Resource Management in 802.11 Networks. CoRR abs/1410.4180 (2014) - [i11]Jashua Rajesh Modapothala, Biju Issac:
Analysis of corporate environmental reports using statistical techniques and data mining. CoRR abs/1410.4182 (2014) - [i10]Seibu Mary Jacob, Biju Issac:
The mobile devices and its mobile learning usage analysis. CoRR abs/1410.4375 (2014) - [i9]Biju Issac, K. Hamid, C. E. Tan:
Hybrid Mobility Prediction of 802.11 Infrastructure Nodes by Location Tracking and Data Mining. CoRR abs/1410.4377 (2014) - [i8]Seibu Mary Jacob, Biju Issac:
Mobile Learning Culture and Effects in Higher Education. CoRR abs/1410.4379 (2014) - [i7]Biju Issac:
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. CoRR abs/1410.4398 (2014) - [i6]Biju Issac, Raymond Chiong, Seibu Mary Jacob:
Analysis of Phishing Attacks and Countermeasures. CoRR abs/1410.4672 (2014) - [i5]Seibu Mary Jacob, Biju Issac:
Formative Assessment and its E-learning Implementation. CoRR abs/1410.4675 (2014) - [i4]Seibu Mary Jacob, Biju Issac:
Problem Based Learning and Implementations. CoRR abs/1410.4677 (2014) - [i3]Biju Issac, Khairuddhin Ab Hamid, C. E. Tan:
QoS Survey in IPv6 and Queuing Methods. CoRR abs/1410.4695 (2014) - [i2]Biju Issac, Khairuddhin Ab Hamid, C. E. Tan:
Analysis of Demand Driven Ad-hoc Routing Protocols on Performance and Mobility. CoRR abs/1410.4700 (2014) - [i1]Shuang Song, Biju Issac:
Analysis of WiFi and WiMAX and Wireless Network Coexistence. CoRR abs/1412.0721 (2014) - 2013
- [c5]Kuruvilla Mathew, Biju Issac, Tan Chong Eng:
Ambient noise analysis on sound for use in wireless digital transmission. CITA 2013: 1-4
2000 – 2009
- 2009
- [j4]Biju Issac:
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. Int. J. Netw. Secur. 8(2): 107-118 (2009) - [c4]Jashua Rajesh Modapothala, Biju Issac, E. Jayamani:
Appraising the Corporate Sustainability Reports - Text Mining and Multi-Discriminatory Analysis. SCSS 2009: 489-494 - 2008
- [j3]Seibu Mary Jacob, Biju Issac:
Mobile Technologies and its Impact - An Analysis in Higher Education Context. Int. J. Interact. Mob. Technol. 2(1) (2008) - [c3]Biju Issac:
First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices. SCSS (1) 2008: 319-324 - [c2]Biju Issac, Seibu Mary Jacob:
Effects of Online MCQ Tests on Student Learning. EIAT/IETA 2008: 403-408 - 2007
- [j2]Lawan A. Mohammed, Biju Issac:
Detailed DoS attacks in wireless networks and countermeasures. Int. J. Ad Hoc Ubiquitous Comput. 2(3): 157-166 (2007) - [j1]Biju Issac, Lawan A. Mohammed:
War Driving and WLAN Security Issues - Attacks, Security Design and Remedies. Inf. Syst. Manag. 24(4): 289-298 (2007) - 2006
- [c1]Seibu Mary Jacob, Biju Issac, Yakub Sebastian:
Impact on Student Learning From Traditional Continuous Assessment and an E-Assessment Proposal. PACIS 2006: 63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint