Biju Issac
Biju Issac
Computer and Information Sciences, Northumbria University, England, UK
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
The mobile devices and its mobile learning usage analysis
SM Jacob, B Issac
arXiv preprint arXiv:1410.4375, 2008
1712008
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac
Future Generation Computer Systems 80, 157-170, 2018
732018
Mobile technologies and its impact-an analysis in higher education context.
SM Jacob, B Issac
International Journal of Interactive Mobile Technologies 2 (1), 2008
682008
Analysis of WiFi and WiMAX and Wireless Network Coexistence
S Song, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (6), 63-78, 2014
432014
Mobile learning culture and effects in higher education
SM Jacob, B Issac
arXiv preprint arXiv:1410.4379, 2007
372007
Intelligent spam classification for mobile text message
K Mathew, B Issac
Proceedings of 2011 International Conference on Computer Science and Network …, 2011
352011
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
B Issac
International Journal of Network Security 8 (2), 107-118, 2009
35*2009
Implementing spam detection using Bayesian and Porter Stemmer keyword stripping approaches
B Issac, WJ Jap
TENCON 2009-2009 IEEE Region 10 Conference, 1-5, 2009
332009
Analysis of IPv6 Transition Technologies
A Albkerat, B Issac
International Journal of Computer Networks & Communications (IJCNC) 6 (5), 19-38, 2014
292014
Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses
B Issac, WJ Jap, JH Sutanto
2009 International conference on computer engineering and technology 2, 326-330, 2009
232009
Secure unicast address resolution protocol (S-UARP) by extending DHCP
B Issac, LA Mohammed
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
192005
Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system
M Albayati, B Issac
International Journal of Computational Intelligence Systems 8 (5), 841-853, 2015
172015
Different Firewall Techniques: A Survey
RK Sharma, HK Kalita, B Issac
2014 International Conference on Computing, Communication and Networking …, 2014
172014
Detailed DoS attacks in wireless networks and countermeasures
LA Mohammed, B Issac
International Journal of Ad Hoc and Ubiquitous Computing 2 (3), 157-166, 2007
162007
Analysis of IPv6 network communication using simulation
E Chen, TH Thiam, B Issac, TH Nguan
2006 4th Student Conference on Research and Development, 11-15, 2006
162006
The art of war driving and security threats-a Malaysian case study
B Issac, SM Jacob, LA Mohammed
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
162005
Analysis of IEEE 802.11 b wireless security for university wireless LAN design
FKL Chan, AH Hoon, B Issac
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
15*2005
Secure electronic voting system based on image steganography
L Rura, B Issac, MK Haldar
2011 IEEE Conference on Open Systems, 80-85, 2011
142011
Appraising the corporate sustainability reports–text mining and multi-discriminatory analysis
JR Modapothala, B Issac, E Jayamani
Innovations in Computing Sciences and Software Engineering, 489-494, 2010
132010
DoS Attacks and Defense Mechanisms in wireless networks
LA Mohammed, B Issac
2nd International Conference on Mobile Technology, Applications and Systems, 2005
132005
The system can't perform the operation now. Try again later.
Articles 1–20