Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent ML-Based IDS Framework for DDoS Detection in the SDN Environment., , and . MoMM, volume 13634 of Lecture Notes in Computer Science, page 18-31. Springer, (2022)Machine Learning Method for DDoS Detection and Mitigation in a Multi-controller SDN Environment Using Cloud Computing., , and . ISDA (2), volume 715 of Lecture Notes in Networks and Systems, page 555-564. Springer, (2022)A secure mobile agents approach for anomalies detection on firewalls., , and . iiWAS, page 689-693. ACM, (2008)A Formal Approach for Network Security Policy Relevancy Checking., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 555-564. Springer, (2017)Design for testability of communication protocols based on SDL language., , and . SDL Forum, page 151-. Elsevier, (1997)Firewalls anomalies' detection system based on web services / mobile agents interactions., , and . CRiSIS, page 235-241. IEEE, (2008)Cloud Security Quantitative Assessment Based on Mobile Agent and Web Service Interaction., , and . MSPN, volume 10026 of Lecture Notes in Computer Science, page 153-167. Springer, (2016)Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server.. Int. J. Netw. Manag., 26 (6): 553-578 (2016)A Study of Some Influencing Factors in Testability and Diagnostics Based on FSMs., , and . ISCC, page 109-115. IEEE Computer Society, (1999)New efficient algorithm for recognizing handwritten Hindi digits., , and . Document Recognition and Retrieval, volume 4670 of SPIE Proceedings, page 68-73. SPIE, (2002)