From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Khondoker, Rahamatullah
add a person with the name Khondoker, Rahamatullah
 

Другие публикации лиц с тем же именем

Cybersecurity Attacks and Vulnerabilities During COVID-19., , , , и . AINA (3), том 655 из Lecture Notes in Networks and Systems, стр. 532-545. Springer, (2023)Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA)., , , и . J. ICT Stand., 2 (2): 151-186 (2014)A description language for communication services of future network architectures., , и . NOF, стр. 68-75. IEEE, (2011)Security Analysis of Software Defined Networking Architectures: PCE, 4D and SANE., , , и . AINTEC, стр. 15. ACM, (2014)LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks., , , , , , и . AIIoT, стр. 753-759. IEEE, (2022)Research Trends in Security and DDoS in SDN., , , и . Secur. Commun. Networks, 9 (18): 6386-6411 (2016)An Expert Survey for the Evaluation of 5G Adoption in Bangladesh., , , , и . AINA (3), том 655 из Lecture Notes in Networks and Systems, стр. 446-457. Springer, (2023)NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains., , , , и . AIIoT, стр. 736-742. IEEE, (2022)Security Analysis of Software Defined Networking Applications for Monitoring and Measurement: sFlow and BigTap., , , и . CFI, стр. 51-56. ACM, (2015)Requirement Driven Prospects for Realizing User-Centric Network Orchestration, , , , , , и . Multimedia Tools and Applications, (июня 2014)