Author of the publication

Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.

, and . J. Netw. Comput. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Socio-Emotional Computational Analysis of Propaganda Campaigns on Social Media Users in the Middle East., , and . WWW (Companion Volume), page 1413-1421. ACM, (2023)Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks., , , , , and . COMPSAC, page 617-626. IEEE, (2023)AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter., , and . ISI, page 1-6. IEEE, (2023)Detecting science-based health disinformation: a stylometric machine learning approach., , and . J. Comput. Soc. Sci., 6 (2): 817-843 (October 2023)Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection., , , and . BDCAT, page 40-47. IEEE, (2022)From Theory to Practice: Towards an OSINT Framework to Mitigate Arabic Social Cyber Attacks., , and . IDSTA, page 146-151. IEEE, (2022)Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems., , and . ISPA/BDCloud/SocialCom/SustainCom, page 1617-1624. IEEE, (2021)Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques., and . SERE, page 159-168. IEEE, (2013)SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks., and . OTM Workshops, volume 11878 of Lecture Notes in Computer Science, page 211-220. Springer, (2019)Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach., and . J. Netw. Comput. Appl., (2017)