Author of the publication

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Text Classification Strategy Based on a Word Embedding and Noise-Words Removal., and . ACIT, page 1-16. IEEE, (2023)Intrusion Detection Systems in Fog Computing - A Review., , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 481-504. Springer, (2021)Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review., , , , and . IEEE Access, (2020)Intrusion Detection System using Modified Arithmetic Optimization Algorithm for Large-scale IoT., , and . ICCR, page 1-6. IEEE, (2024)Comparative Evaluation of Bio-Inspired Feature Selection Methods in Intrusion Detection., , and . ICCR, page 1-6. IEEE, (2024)Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map., , , , , and . J. Sens. Actuator Networks, 12 (5): 73 (September 2023)Abnormal Transactions Detection in the Ethereum Network Using Semi-Supervised Generative Adversarial Networks., and . IEEE Access, (2023)A Labeled Transactions-Based Dataset on the Ethereum Network., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 61-79. Springer, (2020)Integrating Enhanced Security Protocols with Moving Object Detection: A Yolo-Based Approach for Real-Time Surveillance., , and . ICCR, page 1-6. IEEE, (2024)Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization., , , , and . Expert Syst. Appl., (2022)