Author of the publication

Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.

, , , , , , and . RIVF, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks., , , and . ISCIT, page 1-6. IEEE, (2022)Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 298-305. Springer, (2017)A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation., , , and . SoICT, page 200-207. ACM, (2018)XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 546-561. Springer, (2023)A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 353-368. Springer, (2021)Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 131-147. Springer, (2021)Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network., , , , and . RIVF, page 1-6. IEEE, (2021)A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network., , , , , , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 327-339. IOS Press, (2021)MalDEX: An Explainable Malware Detection System Based on Ensemble Learning., , , and . MAPR, page 1-6. IEEE, (2023)On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors., , , , , and . MAPR, page 1-6. IEEE, (2023)