Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol., and . IEEE Trans. Netw. Serv. Manag., 18 (1): 1077-1091 (2021)Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes., , , and . IEEE Access, (2020)A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols.. University of Arizona, Tucson, USA, (2019)base-search.net (ftunivarizona:oai:repository.arizona.edu:10150/632978).Teaching and Training Cybersecurity as a Cloud Service., , , , , and . ICCAC, page 302-308. IEEE Computer Society, (2015)Cross Layer Anomaly Based Intrusion Detection System.. SASO Workshops, page 157-161. IEEE Computer Society, (2015)Secure and Resilient Cloud Services for Enhanced Living Environments., , , and . IEEE Cloud Comput., 3 (6): 44-52 (2016)Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Multi-Layer Mapping of Cyberspace for Intrusion Detection., , , , , , and . AICCSA, page 1-8. IEEE, (2021)Autoinfotainment Security Development Framework (ASDF) for Smart Cars., , , and . ICCAC, page 153-159. IEEE Computer Society, (2017)Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data., , , and . AICCSA, page 1-7. IEEE Computer Society, (2018)