Author of the publication

A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.

, , , and . ARES, page 516-521. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods., , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (5): 516-524 (2010)Semantic Disambiguation and Linking of Quantitative Mentions in Textual Content., , , , and . Int. J. Semantic Comput., 10 (1): 121- (2016)A real-time hostile activities analyses and detection system., , , , and . Appl. Soft Comput., (2021)A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management., and . J. Comput. Virol. Hacking Tech., 10 (1): 29-51 (2014)A Rule-based Temporal Alert Correlation System., and . Int. J. Netw. Secur., 5 (1): 66-72 (2007)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS., , , , and . IEEE Internet Things J., 7 (12): 11524-11535 (2020)Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders., , , , , and . IEEE Access, (2022)QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution., , and . IEEE Access, (2022)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)