Author of the publication

Securing Software Defined Networking Using Intrusion Detection System - A Review.

, , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 417-446. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Systems of ICMPv6-based DDoS attacks., , , and . Neural Comput. Appl., 30 (1): 45-56 (2018)Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks., , , , and . IEEE Access, (2023)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review., , , , , , and . IEEE Access, (2022)Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network., , , and . J. Commun., 13 (5): 198-208 (2018)A Review of Peer-to-Peer Botnet Detection Techniques., , , , and . J. Comput. Sci., 10 (1): 169-177 (2014)A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)., , and . J. Comput. Sci., 11 (3): 590-597 (2015)Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks., , , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 10 (2022)The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 479-491. Springer, (2020)COVID-19 Automatic Detection Using Deep Learning., , and . Comput. Syst. Sci. Eng., 39 (1): 15-35 (2021)