Volume 10 (2020)
Issue 1
Pages | Title | Author(s) | Papers |
906 - 909 | Using ML Models to Detect Malicious Traffic: Testing ML Models DOI: 10.20533/ijisr.2042.4639.2020.0104 |
Paulo Pereira |
![]() |
910 - 923 | A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System DOI: 10.20533/ijisr.2042.4639.2020.0105 |
Olayemi O. Olasehinde |
![]() |
924 - 931 | Photoanthropometric Auricular Morphology for Identification in Southeast Nigerians DOI: 10.20533/ijisr.2042.4639.2020.0106 |
Onyinye Mary Ozioko, O.A. Egwu, Uche Sebastine Ozioko |
![]() |
932 - 943 | Using DPI and Statistical Analysis in Encrypted Network Traffic Monitoring DOI: 10.20533/ijisr.2042.4639.2020.0107 |
Luca Deri, Daniele Sartiano |
![]() |
944 - 956 | The Design and Implementation of RTiK+ to Support a Real-time Processing on Tablet PC Platforms DOI: 10.20533/ijisr.2042.4639.2020.0108 |
Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee |
![]() |
957 - 961 | A Critique of Active Defense or ‘Hack Back’ DOI: 10.20533/ijisr.2042.4639.2020.0109 |
Anthony Caldwell, Kevin Curran |
![]() |