A study on NSL-KDD dataset for intrusion detection system based on classification algorithms
L Dhanabal, SP Shantharajah |
1042 |
2015 |
IoT based smart agriculture
N Gondchawar, RS Kawitkar |
736 |
2016 |
Analysis of e-commerce and m-commerce: advantages, limitations and security issues
M Niranjanamurthy, N Kavyashree, S Jagannath, D Chahar |
433 |
2013 |
A survey on image classification approaches and techniques
P Kamavisdar, S Saluja, S Agrawal |
345 |
2013 |
The impact and limitations of artificial intelligence in cybersecurity: a literature review
MF Ansari, B Dash, P Sharma, N Yathiraju |
224 |
2022 |
The study of e-commerce security issues and solutions
M Niranjanamurthy, D Chahar |
214 |
2013 |
Network simulation tools survey
S Siraj, A Gupta, R Badgujar |
202 |
2012 |
Data mining techniques and applications to agricultural yield data
D Ramesh, BV Vardhan |
187 |
2013 |
Effective pre-processing activities in text mining using improved porter’s stemming algorithm
C Ramasubramanian, R Ramya |
181 |
2013 |
Solar radiation machine learning production depend on training neural networks with ant colony optimization algorithms
E El-kenawy |
179 |
2018 |
A comparative study on decision tree and random forest using R tool
TR Prajwala |
167 |
2015 |
Web based student information management system
SR Bharamagoudar, RB Geeta, SG Totad |
161 |
2013 |
A survey on machine learning techniques for intrusion detection systems
J Singh, MJ Nene |
158 |
2013 |
WEKA approach for comparative study of classification algorithm
TC Sharma, M Jain |
151 |
2013 |
Comparative analysis of bayes and lazy classification algorithms
S Vijayarani, M Muthulakshmi |
137 |
2013 |
Big data–concepts, applications, challenges and future scope
S Mukherjee, R Shaw |
135 |
2016 |
Cloud computing basics
J Srinivas, KVS Reddy, AM Qyser |
134 |
2012 |
Data security and privacy in cloud storage using hybrid symmetric encryption algorithm
L Arockiam, S Monikandan |
126 |
2013 |
A survey of noise removal techniques for ECG signals
B Chandrakar, OP Yadav, VK Chandra |
125 |
2013 |
Overview of cyber security
PS Seemma, S Nandhini, M Sowmiya |
122 |
2018 |
A leaf recognition technique for plant classification using RBPNN and Zernike moments
AH Kulkarni, HM Rai, KA Jahagirdar, PS Upparamani |
110 |
2013 |
Anti-phishing techniques–a review of Cyber Defense Mechanisms
P Sharma, B Dash, MF Ansari |
107 |
2022 |
A comparative analysis of image interpolation algorithms
PS Parsania, PV Virparia |
104 |
2016 |
A survey on association rule mining
T Karthikeyan, N Ravikumar |
102 |
2014 |