Follow
Dr Biju Issac (CEng, SFHEA & SMIEEE)
Dr Biju Issac (CEng, SFHEA & SMIEEE)
Associate Prof, Head of Subject (Networks & Cybersecurity), Director of ACE-CSR, Northumbria Uni, UK
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac
Future Generation Computer Systems 80, 157-170, 2018
2532018
The mobile devices and its mobile learning usage analysis
SM Jacob, B Issac
arXiv preprint arXiv:1410.4375, 2008
2302008
Mobile technologies and its impact-an analysis in higher education context.
SM Jacob, B Issac
International Journal of Interactive Mobile Technologies 2 (1), 2008
1032008
Analysis of WiFi and WiMAX and Wireless Network Coexistence
S Song, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (6), 63-78, 2014
722014
Mobile learning culture and effects in higher education
SM Jacob, B Issac
arXiv preprint arXiv:1410.4379, 2007
592007
A Survey on Biometrics and Cancelable Biometrics Systems
B Choudhury, P Then, B Issac, V Rahman, MK Haldar
International Journal of Image and Graphics 18 (1), 39 pages, 2018
582018
Detecting spam email with machine learning optimized with bio-inspired metaheuristic algorithms
S Gibson, B Issac, L Zhang, SM Jacob
Ieee Access 8, 187914-187932, 2020
572020
Intelligent spam classification for mobile text message
K Mathew, B Issac
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
542011
Implementing spam detection using Bayesian and Porter Stemmer keyword stripping approaches
B Issac, WJ Jap
TENCON 2009-2009 IEEE Region 10 Conference, 1-5, 2009
542009
IoT-based Android Malware Detection using Graph Neural Network with Adversarial Defense
R Yumlembam, B Issac, SM Jacob, L Yang
IEEE Internet of Things Journal, 2022
442022
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
B Issac
International Journal of Network Security 8 (2), 107-118, 2009
40*2009
Different Firewall Techniques: A Survey
RK Sharma, HK Kalita, B Issac
2014 International Conference on Computing, Communication and Networking …, 2014
352014
Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
M Albayati, B Issac
International Journal of Computational Intelligence Systems 8 (5), 841-853, 2015
312015
Analysis of IPv6 Transition Technologies
A Albkerat, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (5), 19-38, 2014
302014
Detection of Hate Tweets using Machine Learning and Deep Learning
L Ketsbaia, B Issac, X Chen
IEEE TrustCom 2020 - 19th IEEE International Conference on Trust, Security …, 2020
282020
Appraising the corporate sustainability reports–text mining and multi-discriminatory analysis
JR Modapothala, B Issac, E Jayamani
Innovations in computing sciences and software engineering, 489-494, 2010
282010
Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses
B Issac, WJ Jap, JH Sutanto
2009 International conference on computer engineering and technology 2, 326-330, 2009
282009
Automatic Analysis of Corporate Sustainability Reports and Intelligent Scoring
AM Shahi, B Issac, JR Modapothala
International Journal of Computational Intelligence and Applications (IJCIA …, 2014
242014
Secure unicast address resolution protocol (S-UARP) by extending DHCP
B Issac, LA Mohammed
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
242005
Enhanced Cuckoo Search Algorithm for Virtual Machine Placement in Cloud Data Centers
E Barlaskar, J Singh, B Issac
International Journal of Grid and Utility Computing 9 (1), 1-17, 2018
232018
The system can't perform the operation now. Try again later.
Articles 1–20