Chanaka Lasantha Nanayakkara et al. Defending Cloud Web Applications Using Machine Learning-Driven Triple Validation of IP Reputation by Integrating Security Operation Center
Jedidiah Aqui et al. Mobile Adhoc Networks and Networking – An Overview of Existing Intrusion Prevention Techniques and Predictive Intrusion Prevention.
Jedidiah Aqui et al. Mobile Adhoc Networks and Networking – Integrating Risk Profiles into Intrusion Prevention Systems to Improve Predictive Intrusion Prevention
Jedidiah Aqui et al. Mobile Adhoc Network Risk Profiles-An overview of Existing Network Traffic Datasets to determine Ideal Axiom Criteria