Author of the publication

A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward fast and accurate emergency cases detection in BSNs., , , , , and . IET Wirel. Sens. Syst., 10 (1): 47-60 (2020)Converged AI, IoT, and blockchain technologies: a conceptual ethics framework., , , , and . AI Ethics, 2 (1): 129-143 (2022)Efficient anomaly detection on sampled data streams with contaminated phase I data., , , , , and . Internet Technol. Lett., (2020)Towards Efficient Data Sampling for Temporal Anomaly Detection in Sensor Networks., , , , and . MENACOMM, page 1-6. IEEE, (2019)Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)A survey on access control mechanisms for cloud computing., , , and . Trans. Emerg. Telecommun. Technol., (2020)A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks., , , , , , and . IEEE Access, (2021)Permissionless reputation-based consensus algorithm for blockchain., , , and . Internet Technol. Lett., (2020)Sampling, qualification and analysis of data streams. (Échantillonnage, qualification et analyse des flux de données).. Sorbonne University, France, (2018)A new software-based service provision approach for vehicular cloud., , , , and . GSCIT, page 1-6. IEEE, (2015)