Zahra Jadidi
Title
Cited by
Cited by
Year
Intrusion detection using reduced-size RNN based on feature grouping
M Sheikhan, Z Jadidi, A Farrokhi
Neural Computing and Applications 21 (6), 1185-1190, 2012
1032012
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, M Sheikhan
Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd …, 2013
752013
Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
M Sheikhan, Z Jadidi
Neural Computing and Applications 24 (3-4), 599-611, 2014
632014
Misuse detection using hybrid of association rule mining and connectionist modeling
M Sheikhan, Z Jadidi
World Applied Sciences Journal 7, 31-37, 2009
322009
Metaheuristic Algorithms Based Flow Anomaly Detector
Z Jadidi, V Muthukkumarasamy, E Sithirasenan
Communications (APCC), 2013 19th Asia-Pacific Conference on, 717-722, 2013
172013
A high precision crack classification system using multi-layered image processing and deep belief learning
J Jo, Z Jadidi
Structure and Infrastructure Engineering, 1-9, 2019
122019
Performance of Flow-based Anomaly Detection in Sampled Traffic
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Journal of Networks 10 (9), 512-520, 2016
122016
Flow-based anomaly detection using semisupervised learning
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Signal Processing and Communication Systems (ICSPCS), 2015 9th International …, 2015
102015
Intelligent Sampling Using an Optimized Neural Network
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Journal of Networks 11 (01), 16-27, 2016
72016
A Drone-Based Building Inspection System Using Software-Agents
J Jo, Z Jadidi, B Stantic
International Symposium on Intelligent and Distributed Computing, 115-121, 2017
62017
A probabilistic sampling method for efficient flow-based analysis
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Journal of Communications and Networks 18 (5), 818-825, 2016
52016
A probabilistic sampling method for efficient flow-based analysis
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Journal of Communications and Networks 18 (5), 818 - 825, 2015
52015
Based Intrusion Detection Techniques
Z Jadidi, V Muthukkumarasamy, E Sithirasenan
The State of the Art in Intrusion Prevention and Detection, 285, 2014
32014
The Use of Machine Learning for Correlation Analysis of Sentiment and Weather Data
H Li, Z Jadidi, J Chen, J Jo
International Conference on Robot Intelligence Technology and Applications …, 2017
22017
Flow-Based Anomaly Detection in Big Data
Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh
Networking for Big Data, 257-279, 2015
2*2015
Flow-Based Anomaly Detection in Big Data
Z Jadidi, V Muthukkumarasamy
Networking for Big Data 2, 257, 2015
22015
Tecno-streams approach for content-based image retrieval
M Analoui, M Beheshti, MT Mahmoudi, Z Jadidi
Nature and Biologically Inspired Computing (NaBIC), 2010 Second World …, 2010
22010
securing manufacturing using blockchain
Z Jadidi, A Dorri, R Jordak, C Fidge
arXiv preprint arXiv:2010.07493., 2020
12020
Securing Manufacturing Using Blockchain
Z Jadidi, A Dorri, R Jurdak, C Fidge
IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
12020
Flow-based Anomaly Detection in High-Speed Networks
Z Jadidi
12015
The system can't perform the operation now. Try again later.
Articles 1–20