Author of the publication

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Flexible Schema for Document Oriented Database (SDOD)., , and . KEOD, page 413-419. ScitePress, (2019)Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , and . IEEE Access, (2020)Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification., , , and . ACeS, volume 1132 of Communications in Computer and Information Science, page 168-181. Springer, (2019)Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation., and . J. King Saud Univ. Comput. Inf. Sci., 36 (6): 102112 (2024)The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 479-491. Springer, (2020)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology., , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 705-713. Springer, (2019)An overview of DDoS attacks based on DNS., , , , and . ICTC, page 276-280. IEEE, (2016)Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 340-360. Springer, (2021)Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP)., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 401-416. Springer, (2021)