Author of the publication

Denial-of Service (DoS) Attack Detection Using Edge Machine Learning.

, , and . ICMLA, page 1741-1745. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Assistant for Forensics Recovery of IoT Devices., and . BigDataSecurity, page 186-190. IEEE, (2021)Design and Analysis of an Open-Source SDN-based 5G Standalone Testbed., , , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)Anomaly Detection in Embedded Devices Through Hardware Introspection., , and . SVCC, page 1-7. IEEE, (2023)Windows Virtualization Architecture For Cyber Threats Detection., , , and . ICDIS, page 119-122. IEEE, (2018)Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle., , , , , and . Future Internet, 13 (12): 312 (2021)The furniture company: deductive databases and the scheduling problem.. Int. J. Inf. Manag., 23 (6): 523-536 (2003)Personality, Mood and Music Listening of Computer Information Systems Developers: Implications for Quality-of-Work., , and . Inf. Resour. Manag. J., 22 (2): 83-97 (2009)IP Traceback using header compression., , and . Comput. Secur., 22 (2): 136-151 (2003)Improving the performance of client Web object retrieval.. J. Syst. Softw., 74 (3): 303-311 (2005)SDN-based GTP-U Traffic Analysis for 5G Networks., , , and . NOMS, page 1-4. IEEE, (2023)