Author of the publication

Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN.

, , and . ICCNS, page 154-158. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A federated threat hunting system with big data analysis for SDN-enabled networks., , , , and . RIVF, page 35-40. IEEE, (2022)Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network., , , , and . RIVF, page 1-6. IEEE, (2021)A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation., , , , , and . SoICT, page 142-149. ACM, (2022)A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network., , , , , , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 327-339. IOS Press, (2021)MalDEX: An Explainable Malware Detection System Based on Ensemble Learning., , , and . MAPR, page 1-6. IEEE, (2023)On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors., , , , , and . MAPR, page 1-6. IEEE, (2023)A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 353-368. Springer, (2021)Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 131-147. Springer, (2021)XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 546-561. Springer, (2023)Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks., , , and . ISCIT, page 1-6. IEEE, (2022)