Author of the publication

Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment.

, , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 14-23. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Based Clustering of Consumers' Big Data in Industrial Applications., , , , , , , and . ICCE, page 1-3. IEEE, (2023)Autoencoders Based Optimized Deep Learning Model for the Detection of Cyber Attack in IoT Environment., , , , and . ICCE, page 1-6. IEEE, (2024)Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment., , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 14-23. Springer, (2023)A Scalable Sharding Protocol Based on Cross-Shard Dynamic Transaction Confirmation for Alliance Chain in Intelligent Systems., , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-30 (2023)Exploring the Intersection of Athletic Psychology and Emerging Technologies., , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-15 (2023)Cloud-Based Image Segmentation Approach for Internet of Drones (IoD)., , , , and . INFOCOM (Workshops), page 1-6. IEEE, (2024)Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption., , , , , and . Comput. Electr. Eng., (2024)Mobile Cloud Computing and Sustainable Development: Opportunities, Challenges, and Future Directions., , , , , , and . Int. J. Cloud Appl. Comput., 12 (1): 1-20 (2022)Secure authentication and privacy-preserving blockchain for industrial internet of things., , , , , and . Comput. Electr. Eng., (May 2023)Enhancing Email Security in Consumer Electronics with a Hybrid Deep Learning Approach., , , and . ICCE, page 1-5. IEEE, (2024)