Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method., , , , , , and . Int. J. Commun. Networks Inf. Secur., (2019)Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm., , , , , and . Inf. Technol. Control., 50 (3): 495-506 (2021)Improvement of attack detection performance on the internet of things with PSO-search and random forest., , , , , , and . J. Comput. Sci., (2022)Attack classification of an intrusion detection system using deep learning and hyperparameter optimization., , , and . J. Inf. Secur. Appl., (2021)Penetration Testing and Network Auditing: Linux., , and . J. Inf. Process. Syst., 11 (1): 104-115 (2015)An Approach for Optimizing Ensemble Intrusion Detection Systems., , , , , , , , , and . IEEE Access, (2021)Cyber-Attack Penetration Test and Vulnerability Analysis., , , , and . Int. J. Online Eng., 13 (1): 125-132 (2017)Investigating Brute Force Attack Patterns in IoT Network., , , , , and . J. Electr. Comput. Eng., (2019)Research on Heteregeneous Data for Recognizing Threat., , and . ICSOFT (1), page 222-225. SciTePress, (2011)Penetration Testing and Mitigation of Vulnerabilities Windows Server., , , , and . Int. J. Netw. Secur., 18 (3): 501-513 (2016)