Author:Lov Kumar
KeyphrasesAnti-patterns, attacker profiling, clustering algorithms, code-mixing, code-switching, deep learning, Distributed Denial of Service Attacks, Dravidian, Ensemble Techniques, Honey Pot, Kanglish, machine learning, Manglish, sentiment classification, SMOTE, Tanglish, Web Services, WSDL, WSDL Metrics. |