From post

Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP).

, , , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 401-416. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Hasbullah, Iznan Husainy
add a person with the name Hasbullah, Iznan Husainy
 

Другие публикации лиц с тем же именем

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , и . IEEE Access, (2020)An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network., , , и . Symmetry, 12 (10): 1687 (2020)Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic., , , и . PeerJ Comput. Sci., (2021)A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things., , , , , и . Sensors, 22 (9): 3400 (2022)Comparative performance analysis of classification algorithms for intrusion detection system., , , , и . PST, стр. 282-288. IEEE, (2016)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , и . IEEE Access, (2021)Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP)., , , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 401-416. Springer, (2021)Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol., , , , , и . PST, стр. 275-281. IEEE, (2016)Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey., , , , и . IEEE Access, (2021)Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks., , , , , , и . ACeS, том 1347 из Communications in Computer and Information Science, стр. 588-603. Springer, (2020)