Author of the publication

A comprehensive approach to discriminate DDoS attacks from flash events.

, , and . J. Inf. Secur. Appl., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An information theoretic approach for feature selection., and . Secur. Commun. Networks, 5 (2): 178-185 (2012)LSRC: Lexicon star rating system over cloud., and . RAIT, page 1-6. IEEE, (2018)EVS-DK: Event video skimming using deep keyframe.. J. Vis. Commun. Image Represent., (2019)Traffic aware load balancing in AOMDV for mobile Ad-hoc networks., and . J. Comm. Inform. Networks, 2 (3): 123-130 (2017)Spectrum handoff scheme with multiple attributes decision making for optimal network selection in cognitive radio networks., , and . Digit. Commun. Networks, 3 (3): 164-175 (2017)Test case prioritization based on requirements and risk factors., , and . ACM SIGSOFT Softw. Eng. Notes, (2008)AFSOS: An Auction Framework and Stackelberg Game Oriented Optimal Network's Resource Selection Technique in Cognitive Radio Networks., and . IEEE Trans. Netw. Serv. Manag., 19 (1): 61-72 (2022)An efficient approach for copy-move image forgery detection using convolution neural network., , , , and . Multim. Tools Appl., 81 (8): 11259-11277 (2022)Detection of DDoS attacks and flash events using novel information theory metrics., and . Comput. Networks, (2017)Study and implementation of K-multiple constraint shortest path for H.265 HEVC for optimal video compression., , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 6149-6164 (2023)