Author of the publication

Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP).

, , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 401-416. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hasbullah, Iznan Husainy
add a person with the name Hasbullah, Iznan Husainy
 

Other publications of authors with the same name

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , and . IEEE Access, (2020)An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network., , , and . Symmetry, 12 (10): 1687 (2020)Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic., , , and . PeerJ Comput. Sci., (2021)A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things., , , , , and . Sensors, 22 (9): 3400 (2022)Comparative performance analysis of classification algorithms for intrusion detection system., , , , and . PST, page 282-288. IEEE, (2016)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP)., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 401-416. Springer, (2021)Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol., , , , , and . PST, page 275-281. IEEE, (2016)Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks., , , , , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 588-603. Springer, (2020)Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey., , , , and . IEEE Access, (2021)