Author of the publication

B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths.

, , , , and . FICTA (1), volume 515 of Advances in Intelligent Systems and Computing, page 767-775. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensemble Learning Approach for Author Profiling., , , , , and . CLEF (Working Notes), volume 1180 of CEUR Workshop Proceedings, page 1148-1156. CEUR-WS.org, (2014)Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions., , and . SNDS, volume 335 of Communications in Computer and Information Science, page 168-177. Springer, (2012)B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths., , , , and . FICTA (1), volume 515 of Advances in Intelligent Systems and Computing, page 767-775. Springer, (2016)Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers., , , , , and . ICIT, page 119-123. IEEE, (2015)Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines., , , , and . FICTA (2), volume 516 of Advances in Intelligent Systems and Computing, page 129-137. Springer, (2016)A lexical approach for classifying malicious URLs., , , , and . HPCS, page 195-202. IEEE, (2015)A graph neural network framework for mapping histological topology in oral mucosal tissue., , , , , and . BMC Bioinform., 23 (1): 506 (2022)Leveraging mutants for automatic prediction of metamorphic relations using machine learning., , and . MaLTeSQuE@ESEC/SIGSOFT FSE, page 1-6. ACM, (2019)funcGNN: A Graph Neural Network Approach to Program Similarity., , and . ESEM, page 10:1-10:11. ACM, (2020)Edge-Based Graph Neural Networks for Cell-Graph Modeling and Prediction., , , , , and . IPMI, volume 13939 of Lecture Notes in Computer Science, page 265-277. Springer, (2023)