Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-phishing: A comprehensive perspective., , , , and . Expert Syst. Appl., 238 (Part F): 122199 (March 2024)Distributed service control technique for detecting security attacks., and . NOMS, page 574-577. IEEE, (2012)On the design of Virtual machine Intrusion detection system., and . Integrated Network Management, page 682-685. IEEE, (2011)A hybrid model against TCP. SYN and reflection DDoS attacks., and . Comput. Syst. Sci. Eng., (2008)A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 113-116. Kluwer, (2003)A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection., , , and . IEEE Commun. Surv. Tutorials, 21 (1): 686-728 (2019)On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience., and . IEEE Trans. Cloud Computing, 5 (3): 375-389 (2017)Security as a Service Model for Cloud Environment., and . IEEE Trans. Network and Service Management, 11 (1): 60-75 (2014)Trust Enhanced Security for Tenant Transactions in the Cloud Environment., and . Comput. J., 58 (10): 2388-2403 (2015)Analysis of traceback techniques., and . ACSW, volume 54 of CRPIT, page 115-124. Australian Computer Society, (2006)