Author of the publication

Predicting network attack patterns in SDN using machine learning approach.

, , , , and . NFV-SDN, page 167-172. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems., , , , , and . CCWC, page 760-764. IEEE, (2022)Partition/aggregate in commodity 10G ethernet software-defined networking., , , , , , and . HPSR, page 7-14. IEEE, (2012)Spread-Spectrum Techniques in Optical Communication Using Transform Domain Processing., and . IEEE J. Sel. Areas Commun., 8 (8): 1608-1616 (1990)Machine Learning for DDoS Attack Classification Using Hive Plots., , , , , , and . UEMCON, page 401-407. IEEE, (2019)Covert Message Channels and Attack Vectors for IEEE Precision Time Protocol., , , , and . ISPCS, page 1-5. IEEE, (2022)A Service Industry Perspective on Software Defined Radio Access Networks., and . ICA3PP (1), volume 9528 of Lecture Notes in Computer Science, page 357-369. Springer, (2015)Red Team Ethical Physical Penetration Testing Simulations using Open Source Intelligence., , , , and . CCWC, page 572-578. IEEE, (2023)Information Assurance for Enterprise Fiber Optic Networks.. IAW, page 282-287. IEEE, (2003)Gamification of cybersecurity training., , and . Gamify@SIGSOFT FSE, page 10-13. ACM, (2022)A Cybersecurity Awareness Escape Room using Gamification Design Principles., , , , , , , , and . CCWC, page 765-770. IEEE, (2022)