Author of the publication

Intrusion detection system based on a modified binary grey wolf optimisation.

, , , , and . Neural Comput. Appl., 32 (10): 6125-6137 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks., , , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 10 (2022)A Review of Peer-to-Peer Botnet Detection Techniques., , , , and . J. Comput. Sci., 10 (1): 169-177 (2014)A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)., , and . J. Comput. Sci., 11 (3): 590-597 (2015)Intrusion Detection Systems of ICMPv6-based DDoS attacks., , , and . Neural Comput. Appl., 30 (1): 45-56 (2018)Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges., , , , and . Comput. Syst. Sci. Eng., 40 (1): 87-112 (2022)COVID-19 Automatic Detection Using Deep Learning., , and . Comput. Syst. Sci. Eng., 39 (1): 15-35 (2021)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms., , , and . IEEE Access, (2021)Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks., , , , and . IEEE Access, (2023)Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network., , , and . J. Commun., 13 (5): 198-208 (2018)Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review., , , , , , and . IEEE Access, (2022)