Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols.. University of Arizona, Tucson, USA, (2019)base-search.net (ftunivarizona:oai:repository.arizona.edu:10150/632978).Cross Layer Anomaly Based Intrusion Detection System.. SASO Workshops, page 157-161. IEEE Computer Society, (2015)Teaching and Training Cybersecurity as a Cloud Service., , , , , and . ICCAC, page 302-308. IEEE Computer Society, (2015)Spatio-Temporal Processing for Automatic Vehicle Detection in Wide-Area Aerial Video., , , , , and . IEEE Access, (2020)Real-Time IRC Threat Detection Framework., , , and . FAS*W@SASO/ICCAC, page 318-323. IEEE Computer Society, (2017)Anomaly Behavior Analysis of DNS Protocol., , , and . J. Internet Serv. Inf. Secur., 5 (4): 85-97 (2015)Multi-Layer Mapping of Cyberspace for Intrusion Detection., , , , , , and . AICCSA, page 1-8. IEEE, (2021)Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data., , , and . AICCSA, page 1-7. IEEE Computer Society, (2018)Autoinfotainment Security Development Framework (ASDF) for Smart Cars., , , and . ICCAC, page 153-159. IEEE Computer Society, (2017)Quantized Transformer Language Model Implementations on Edge Devices., , , , , , and . ICMLA, page 709-716. IEEE, (2023)