Author of the publication

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.

, , , , , and . Sensors, 23 (9): 4441 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hasbullah, Iznan Husainy
add a person with the name Hasbullah, Iznan Husainy
 

Other publications of authors with the same name

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things., , , , , and . Sensors, 22 (9): 3400 (2022)Comparative performance analysis of classification algorithms for intrusion detection system., , , , and . PST, page 282-288. IEEE, (2016)Neighbor discovery protocol anomaly-based detection system using neural network algorithm., , , , and . Int. J. Inf. Sec., 23 (3): 1787-1803 (June 2024)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges., , , , and . Comput. Syst. Sci. Eng., 40 (1): 87-112 (2022)Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP)., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 401-416. Springer, (2021)A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things., , , , , , and . Internet Things, (July 2023)Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , and . IEEE Access, (2020)Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks., , , , and . IEEE Access, (2020)A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks., , , and . Sensors, 22 (5): 1696 (2022)