Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection with Multinomial Logistic Regression and Naïve Bayesian., and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 1129-1136. Springer, (2013)Intrusion detection under covariate shift using modified support vector machine and modified backpropagation., and . SoICT, page 266-271. ACM, (2012)A novel SDN controller based on Ontology and Global Optimization for heterogeneous IoT architecture., , , , , and . SoICT, page 293-300. ACM, (2017)End to end message encryption using Poly1305 and XSalsa20 in Low power and Lossy Networks., , , and . KSE, page 1-5. IEEE, (2019)DGA Botnet Detection Using Supervised Learning Methods., , , , and . SoICT, page 211-218. ACM, (2017)Comparison Between SVM and Back Propagation Neural Network in Building IDS., and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 1121-1127. Springer, (2013)A Machine Learning-Based Framework for Detecting Malicious HTTPS Traffic., , , , , and . SoICT, page 769-776. ACM, (2023)A LSTM based framework for handling multiclass imbalance in DGA botnet detection., , , , and . Neurocomputing, (2018)SHIOT: A Novel SDN-based Framework for the Heterogeneous Internet of Things., , , , , and . Informatica (Slovenia), (2018)A First Look at Android Apps' Third-Party Resources Loading., , , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 193-213. Springer, (2022)